<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adrian+Winckles</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Adrian+Winckles"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Adrian_Winckles"/>
		<updated>2026-04-26T00:26:08Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:RTF-OWASP-Cambridge.pdf&amp;diff=256048</id>
		<title>File:RTF-OWASP-Cambridge.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:RTF-OWASP-Cambridge.pdf&amp;diff=256048"/>
				<updated>2019-11-13T21:31:09Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=256047</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=256047"/>
				<updated>2019-11-13T21:30:07Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|5 November 2019&lt;br /&gt;
|Andrea Scaduto&lt;br /&gt;
|[[Media:RTF-OWASP-Cambridge.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|8 October 2019&lt;br /&gt;
|Dinis Cruz - Revolut&lt;br /&gt;
|[https://www.slideshare.net/DinisCruz/using-owasp-security-bot-osbot-to-make-fact-based-security-decisions Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|8 October 2019&lt;br /&gt;
|Jeff Williams - Contrast Security &lt;br /&gt;
|[https://contrastsecurity.app.box.com/s/w2pv7cb46r3guyob6i1xf0igne9g281g Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Aleksander Gorkowienko - ICS/SCADA Security&lt;br /&gt;
|[https://spirent1-my.sharepoint.com/:b:/g/personal/aleksander_gorkowienko_spirent_com/EfDeMof_rydPsGBCGioPuBAB-7VpkIB4jGVtNv2vm8uUhQ?e=dA7hha presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Andrew Baldwin - Cyber PREVENT&lt;br /&gt;
|[[Media:Cyber_Prevent_for_OWASP_May_2019.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 April 2019&lt;br /&gt;
|Matthew Lorentzen - Sheepl&lt;br /&gt;
|[[Media:OWASP-Sheepl_Presentation_April19.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Jamie Roderick&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Nour Fateen&lt;br /&gt;
|[[Media:Nour_-_OWASP-3.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Matthew Whitcombe&lt;br /&gt;
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:Seconds_out_2018_AI_&amp;amp;_ML_40_min_version.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=255448</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=255448"/>
				<updated>2019-10-14T16:33:37Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: DC Added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|8 October 2019&lt;br /&gt;
|Dinis Cruz - Revolut&lt;br /&gt;
|[https://www.slideshare.net/DinisCruz/using-owasp-security-bot-osbot-to-make-fact-based-security-decisions Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|8 October 2019&lt;br /&gt;
|Jeff Williams - Contrast Security &lt;br /&gt;
|[https://contrastsecurity.app.box.com/s/w2pv7cb46r3guyob6i1xf0igne9g281g Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Aleksander Gorkowienko - ICS/SCADA Security&lt;br /&gt;
|[https://spirent1-my.sharepoint.com/:b:/g/personal/aleksander_gorkowienko_spirent_com/EfDeMof_rydPsGBCGioPuBAB-7VpkIB4jGVtNv2vm8uUhQ?e=dA7hha presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Andrew Baldwin - Cyber PREVENT&lt;br /&gt;
|[[Media:Cyber_Prevent_for_OWASP_May_2019.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 April 2019&lt;br /&gt;
|Matthew Lorentzen - Sheepl&lt;br /&gt;
|[[Media:OWASP-Sheepl_Presentation_April19.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Jamie Roderick&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Nour Fateen&lt;br /&gt;
|[[Media:Nour_-_OWASP-3.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Matthew Whitcombe&lt;br /&gt;
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:Seconds_out_2018_AI_&amp;amp;_ML_40_min_version.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=255447</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=255447"/>
				<updated>2019-10-14T16:29:41Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: add JW&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|8 OCtober 2019&lt;br /&gt;
|Jeff Williams - Contrast Security &lt;br /&gt;
|[https://contrastsecurity.app.box.com/s/w2pv7cb46r3guyob6i1xf0igne9g281g Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Aleksander Gorkowienko - ICS/SCADA Security&lt;br /&gt;
|[https://spirent1-my.sharepoint.com/:b:/g/personal/aleksander_gorkowienko_spirent_com/EfDeMof_rydPsGBCGioPuBAB-7VpkIB4jGVtNv2vm8uUhQ?e=dA7hha presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Andrew Baldwin - Cyber PREVENT&lt;br /&gt;
|[[Media:Cyber_Prevent_for_OWASP_May_2019.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 April 2019&lt;br /&gt;
|Matthew Lorentzen - Sheepl&lt;br /&gt;
|[[Media:OWASP-Sheepl_Presentation_April19.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Jamie Roderick&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Nour Fateen&lt;br /&gt;
|[[Media:Nour_-_OWASP-3.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Matthew Whitcombe&lt;br /&gt;
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:Seconds_out_2018_AI_&amp;amp;_ML_40_min_version.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=251705</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=251705"/>
				<updated>2019-05-17T17:34:56Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Aleksander Gorkowienko - ICS/SCADA Security&lt;br /&gt;
|[https://spirent1-my.sharepoint.com/:b:/g/personal/aleksander_gorkowienko_spirent_com/EfDeMof_rydPsGBCGioPuBAB-7VpkIB4jGVtNv2vm8uUhQ?e=dA7hha presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Andrew Baldwin - Cyber PREVENT&lt;br /&gt;
|[[Media:Cyber_Prevent_for_OWASP_May_2019.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 April 2019&lt;br /&gt;
|Matthew Lorentzen - Sheepl&lt;br /&gt;
|[[Media:OWASP-Sheepl_Presentation_April19.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Jamie Roderick&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Nour Fateen&lt;br /&gt;
|[[Media:Nour_-_OWASP-3.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Matthew Whitcombe&lt;br /&gt;
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:Seconds_out_2018_AI_&amp;amp;_ML_40_min_version.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=251704</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=251704"/>
				<updated>2019-05-17T17:33:30Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Aleksander Gorkowienko - ICS/SCADA Security&lt;br /&gt;
|[https://spirent1-my.sharepoint.com/:b:/g/personal/aleksander_gorkowienko_spirent_com/EfDeMof_rydPsGBCGioPuBAB-7VpkIB4jGVtNv2vm8uUhQ?e=dA7hha|presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Andrew Baldwin - Cyber PREVENT&lt;br /&gt;
|[[Media:Cyber_Prevent_for_OWASP_May_2019.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 April 2019&lt;br /&gt;
|Matthew Lorentzen - Sheepl&lt;br /&gt;
|[[Media:OWASP-Sheepl_Presentation_April19.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Jamie Roderick&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Nour Fateen&lt;br /&gt;
|[[Media:Nour_-_OWASP-3.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Matthew Whitcombe&lt;br /&gt;
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:Seconds_out_2018_AI_&amp;amp;_ML_40_min_version.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Cyber_Prevent_for_OWASP_May_2019.pdf&amp;diff=251703</id>
		<title>File:Cyber Prevent for OWASP May 2019.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Cyber_Prevent_for_OWASP_May_2019.pdf&amp;diff=251703"/>
				<updated>2019-05-17T17:32:31Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=251702</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=251702"/>
				<updated>2019-05-17T17:31:10Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Aleksander Gorkowienko - ICS/SCADA Security&lt;br /&gt;
|[https://spirent1-my.sharepoint.com/:b:/g/personal/aleksander_gorkowienko_spirent_com/EfDeMof_rydPsGBCGioPuBAB-7VpkIB4jGVtNv2vm8uUhQ?e=dA7hha | presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|14 May 2019&lt;br /&gt;
|Andrew Baldwin - Cyber PREVENT&lt;br /&gt;
|[[Media:|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 April 2019&lt;br /&gt;
|Matthew Lorentzen - Sheepl&lt;br /&gt;
|[[Media:OWASP-Sheepl_Presentation_April19.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Jamie Roderick&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Nour Fateen&lt;br /&gt;
|[[Media:Nour_-_OWASP-3.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Matthew Whitcombe&lt;br /&gt;
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:Seconds_out_2018_AI_&amp;amp;_ML_40_min_version.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=251591</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=251591"/>
				<updated>2019-05-15T10:44:30Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|10 April 2019&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:OWASP-Sheepl_Presentation_April19.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Jamie Roderick&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Nour Fateen&lt;br /&gt;
|[[Media:Nour_-_OWASP-3.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Matthew Whitcombe&lt;br /&gt;
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:Seconds_out_2018_AI_&amp;amp;_ML_40_min_version.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-Sheepl_Presentation_April19.pdf&amp;diff=251590</id>
		<title>File:OWASP-Sheepl Presentation April19.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-Sheepl_Presentation_April19.pdf&amp;diff=251590"/>
				<updated>2019-05-15T10:41:48Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Nour_-_OWASP-3.pdf&amp;diff=248878</id>
		<title>File:Nour - OWASP-3.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Nour_-_OWASP-3.pdf&amp;diff=248878"/>
				<updated>2019-03-16T15:20:27Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=248781</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=248781"/>
				<updated>2019-03-14T16:34:59Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Jamie Roderick&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Nour Fateen&lt;br /&gt;
|[[Media:Nour_-_OWASP-3.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Matthew Whitcombe&lt;br /&gt;
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:Seconds_out_2018_AI_&amp;amp;_ML_40_min_version.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=248780</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=248780"/>
				<updated>2019-03-14T16:34:32Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Jamie Roderick&lt;br /&gt;
|[[Media:|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Nour Fateen&lt;br /&gt;
|[[Media:Nour_-_OWASP-3.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|12 March 2019&lt;br /&gt;
|Matthew Whitcombe&lt;br /&gt;
|[[Media:MWR_-_OWASP_v6.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:Seconds_out_2018_AI_&amp;amp;_ML_40_min_version.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:MWR_-_OWASP_v6.pdf&amp;diff=248779</id>
		<title>File:MWR - OWASP v6.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:MWR_-_OWASP_v6.pdf&amp;diff=248779"/>
				<updated>2019-03-14T16:06:32Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=248648</id>
		<title>GSoC2019 Ideas</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=GSoC2019_Ideas&amp;diff=248648"/>
				<updated>2019-03-12T12:17:05Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: OWASP Web Honeypot&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=OWASP Project Requests=&lt;br /&gt;
&lt;br /&gt;
'''Tips to get you started in no particular order:'''  &lt;br /&gt;
 '''* Read [https://developers.google.com/open-source/gsoc/ Google Summer of Code Program(GSOC)]`'''&lt;br /&gt;
 '''* Read the [[GSoC SAT]] '''&lt;br /&gt;
 * Read the [https://www.owasp.org/index.php/GSoC GSOC Student Guidelines]&lt;br /&gt;
 * Contact us through the mailing list or irc channel.&lt;br /&gt;
 * Check our [https://github.com/OWASP github organization]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==OWASP-SKF==&lt;br /&gt;
&lt;br /&gt;
=== Idea 1 Improving the Machine Learning chatbot: ===&lt;br /&gt;
We want to extend the functionality of SKF Bot. (Security Knowledge Framework Chatbot):&lt;br /&gt;
&lt;br /&gt;
Some improvements or the suggestions which we can do to improve the functionality are:&lt;br /&gt;
&lt;br /&gt;
1.    Create a desktop version of the chatbot. Where people can install the setup file on their local machine.&lt;br /&gt;
&lt;br /&gt;
2.    Create a Plugin or website bot which we can add in the website for better chat experience for the user.&lt;br /&gt;
&lt;br /&gt;
3.    Extend the bots capability to do the google search (using web scraping) for the things which are not available in the database. So, it will have a wider scope of knowledge.&lt;br /&gt;
&lt;br /&gt;
4.    Add basic conversation flow which makes SKF Bot friendly and provides the better user experience. Example: Replies to the general queries like How are you? What is your Name etc?&lt;br /&gt;
&lt;br /&gt;
5.    Extend the bot capability to reply to what security controls should be followed from the ASVS and MASVS or other custom checklists that are present in SKF.&lt;br /&gt;
# Extend the bot to different platforms like Facebook, telegram, slack, Google Assistant etc.&lt;br /&gt;
Existing chatbot implementation is on Gitter. You can test the bot by typing @skfchatbot on Gitter Community.&lt;br /&gt;
&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the architecture and code base of SKF (Security Knowledge Framework)&lt;br /&gt;
&lt;br /&gt;
·         Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
&lt;br /&gt;
·         Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
&lt;br /&gt;
·         Python 3+, Flask, Coffee Script&lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''&lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Priyanka Jain (Mentor)&lt;br /&gt;
&lt;br /&gt;
=== Idea 2 Improving and building Lab challenges and write-ups: ===&lt;br /&gt;
Build lab examples and write-ups (how to test) for different vulnerabilities over different technology stacks. These challenges are to be delivered in Docker so they can be &lt;br /&gt;
&lt;br /&gt;
easily deployed.&lt;br /&gt;
&lt;br /&gt;
In the current situation the security knowledge framework ultimately presents a list of security controls with correlating knowledge base items that contain a description and &lt;br /&gt;
&lt;br /&gt;
a solution. The new labs are used to give the software developers or application security specialists a more in depth understanding and approach on how to test the &lt;br /&gt;
&lt;br /&gt;
vulnerabilities in their own code.  &lt;br /&gt;
* For example we have now around 20 lab challenges in Docker container build in Python:&lt;br /&gt;
** A Local File Inclusion Docker app example:&lt;br /&gt;
*** https://github.com/blabla1337/skf-labs/tree/master/LFI&lt;br /&gt;
** A write-up example:&lt;br /&gt;
*** https://owasp-skf.gitbook.io/asvs-write-ups/filename-injection&lt;br /&gt;
The images that are pushed to the Github repository are already automatically build and pushed to a docker registry where the SKF users can easily pull the images from to get their&lt;br /&gt;
&lt;br /&gt;
labs running. Of course they can download it and build it themselves from source by pulling the original repository.  &lt;br /&gt;
&lt;br /&gt;
'''Mentors and Leaders'''  &lt;br /&gt;
&lt;br /&gt;
Glenn ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
Riccardo ten Cate (Mentor, Project leader)&lt;br /&gt;
&lt;br /&gt;
== OWASP DefectDojo ==&lt;br /&gt;
OWASP DefectDojo is a popular open source vulnerability management tool and is used as the backbone for security programs. It is easy to get started with to work on! We welcome volunteers of all experience levels and are happy to provide mentorship.&lt;br /&gt;
&lt;br /&gt;
'''Issue Tracking:'''&lt;br /&gt;
&lt;br /&gt;
Enhancement [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Aenhancement requests] and [https://github.com/DefectDojo/django-DefectDojo/issues?q=is%3Aissue+is%3Aopen+label%3Abug bugfixes] are located in Github issues. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. &lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP DefectDojo&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
'''Getting started:'''&lt;br /&gt;
* Get familiar with the architecture and code base of the application built on Django&lt;br /&gt;
* Review the application functionality and familiarize yourself with Products, Engagements, Tests and Findings.&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Python, Django, Javascript, Unit/Integration testing.&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[Mailto:aaron.weaver2+gsoc@gmail.com|Aaron Weaver]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:greg.anderson@owasp.org|Greg Anderson]] - DefectDojo Project Leader&lt;br /&gt;
* [[Mailto:matt.tesauro@owasp.org|Matt Tesauro]] - DefectDojo Project Leader&lt;br /&gt;
'''Option 1: Unit Tests - Difficulty: Easy'''&lt;br /&gt;
* If you're new to programming, unit tests are short scripts designed to test a specific function of an application.&lt;br /&gt;
* The project needs additional unit tests to ensure that new code functions properly. &lt;br /&gt;
* Review the current [https://github.com/DefectDojo/django-DefectDojo/tree/dev/dojo/unittests unit tests]  &lt;br /&gt;
* Complete Code Coverage Testing&lt;br /&gt;
** Validate Tests exist for the following (create any that are missing):&lt;br /&gt;
*** Finding, Test, Engagement, Reports, Endpoints &lt;br /&gt;
*** Import from all scanners &lt;br /&gt;
'''Option 2: Python3 Completion'''&lt;br /&gt;
* DefectDojo is finishing up a migration to Python3&lt;br /&gt;
Test the current [https://github.com/DefectDojo/django-DefectDojo/tree/python3/dojo/unittests state] of Python3&lt;br /&gt;
* Ensure all features work&lt;br /&gt;
* Travis testing works correctly&lt;br /&gt;
'''Option 3: Scan 2.0 / Launch Containers'''&lt;br /&gt;
&lt;br /&gt;
Scan 2.0 consists of automating the scanning orchestration within DefectDojo. Several proof of concepts exist for this using the AppSecpPipeline to launch containers and then push those finding into the appropriate product. &lt;br /&gt;
* Use the [https://github.com/appsecpipeline/AppSecPipeline-Specification AppSecPipeline] containers to build a scanning pipeline built on top of [https://www.openfaas.com/ OpenFaaS]&lt;br /&gt;
* Scans should be able to be scheduled by DefectDojo and then invoked via the REST API call to OpenFaaS&lt;br /&gt;
* Upon scan completion the results will be posted back to DefectDojo via DefectDojo's REST API and consumed as an engagement/test.&lt;br /&gt;
* Pick 2 or 3 popular open source scanners such as NMAP, ZAP and Nikto to start out with.&lt;br /&gt;
&lt;br /&gt;
== OHP (OWASP Honeypot) ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP_Python_Honeypot|OWASP Honeypot]] is an open source software in Python language which designed for creating honeypot and honeynet in an easy and secure way! This project is compatible with Python 2.x and 3.x and tested on Windows, Mac OS X and Linux.&lt;br /&gt;
&lt;br /&gt;
=== Getting Start ===&lt;br /&gt;
&lt;br /&gt;
It's best to start from [https://github.com/zdresearch/OWASP-Honeypot/wiki GitHub wiki page], we are looking forward to adding more modules and optimize the core.&lt;br /&gt;
&lt;br /&gt;
=== Technologies ===&lt;br /&gt;
&lt;br /&gt;
Currently we are using&lt;br /&gt;
&lt;br /&gt;
* Docker&lt;br /&gt;
* Python&lt;br /&gt;
* MongoDB&lt;br /&gt;
* TShark&lt;br /&gt;
* Flask&lt;br /&gt;
* ChartJS&lt;br /&gt;
* And more linux services&lt;br /&gt;
&lt;br /&gt;
=== Expected Results ===&lt;br /&gt;
&lt;br /&gt;
* Zero Bugs: Currently we may have several bugs in different conditions, and it's best to test the all functions and fix them&lt;br /&gt;
* Monitoring: Right now monitoring limited to the connections (send&amp;amp;recieve) and it's best to store and analysis the contents for farther investigations and recognizing incoming attacks.&lt;br /&gt;
* Duplicated codes: codes are complicated and duplicated in engine, should be fixed/clean up&lt;br /&gt;
* New modules: add some creative ICS/Network/Web modules andvulnerable web applications, services and stuff&lt;br /&gt;
* API: update API sync to all features&lt;br /&gt;
* WebUI: Demonstrate and add API on WebUI and Live version with all features&lt;br /&gt;
* WebUI Special Reports: Track the attacks more creative and provide high risk IPs&lt;br /&gt;
* Database: Better database structure, faster and use queue&lt;br /&gt;
* Data analysis: Analysis stored data and attack signatures&lt;br /&gt;
* OWASP Top 10: Preparing useful processed/raw data for OWASP top 10 project&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Packet Analysis &amp;amp; Tshark &amp;amp; Libpcap&lt;br /&gt;
* Docker&lt;br /&gt;
* Database&lt;br /&gt;
* Web Development Skills&lt;br /&gt;
* Honeypot and Deception knowledge&lt;br /&gt;
&lt;br /&gt;
=== Mentors and Leaders ===&lt;br /&gt;
&lt;br /&gt;
* [mailto:ali.razmjoo@owasp.org Ali Razmjoo] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:ehsan@nezami.me Ehsan Nezami] (Mentor &amp;amp; Project Leader)&lt;br /&gt;
* [mailto:reza.espargham@owasp.org Reza Espargham](Mentor)&lt;br /&gt;
* [mailto:abiusx@owasp.org Abbas Naderi] (Mentor)&lt;br /&gt;
&lt;br /&gt;
== OWASP Juice Shop ==&lt;br /&gt;
&lt;br /&gt;
[[OWASP Juice Shop Project]] is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws. Juice Shop is written in Node.js, Express and Angular. The application contains more than 30 challenges of varying difficulty where the user is supposed to exploit the underlying vulnerabilities. Apart from the hacker and awareness training use case, pentesting proxies or security scanners can use Juice Shop as a &amp;quot;guinea pig&amp;quot;-application to check how well their tools cope with Javascript-heavy application frontends and REST APIs.&lt;br /&gt;
 The best way to get in touch with us is the '''community chat on https://gitter.im/bkimminich/juice-shop&amp;lt;nowiki/&amp;gt;.''' You can also send PMs to the potential mentors (@bkimminich, @J12934 and @CaptainFreak) there if you like!&lt;br /&gt;
&lt;br /&gt;
 To receive early feedback please '''put your proposal on Google Docs and submit it to the OWASP Organization on Google's GSoC page''' in ''Draft Shared'' mode. Please pick '''''juice shop'' as Proposal Tag''' to make them easier to find for us. '''Thank you!'''&lt;br /&gt;
&lt;br /&gt;
=== Feature Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new functionality and &amp;quot;business&amp;quot; features are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Afeature GitHub issues labeled &amp;quot;feature&amp;quot;]. This project could implement a whole bunch of new features one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for features and new functionality in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 5 or more new features or functional enhancements of significant scope for OWASP Juice Shop (not necessarily including corresponding challenges)&lt;br /&gt;
* Each feature comes with full functional unit and integration tests&lt;br /&gt;
* Extending the functional walk-through chapter of the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, security knowledge is optional.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Juice Shop Mobile ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
A complete mobile client for Juice-Shop API which will serve a legit mobile experience for Juice-Shop user as well as a plethora of Mobile app vulnerabilities and challenges around them to solve. Should in the best case translate the idea of Juice Shop's hacking challenges with a score board and success notifications into the mobile world.&lt;br /&gt;
&lt;br /&gt;
''Coming up with a sophisticated proposal (optimally even with a good initial sample implementation) could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's RESTful backend&lt;br /&gt;
* Get familiar with Native App developement&lt;br /&gt;
* Get familiar with Mobile vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A mobile App with consistent UI/UX for Juice-Shop with standard client side vulnerabilities.&lt;br /&gt;
* Sufficient initial release quality (en par with Juice Shop and Juice Shop CTF) to make it an official extension project hosted in its own GitHub repository ''bkimminich/juice-shop-mobile''&lt;br /&gt;
* Code follows existing styleguides and applies similar quality gates regarding code smells, test coverage etc. as the main project.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) React Native and NodeJS/Express, some Mobile security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Challenge Pack 2019 ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
Ideas for potential new hacking challenges are collected in [https://github.com/bkimminich/juice-shop/issues?q=is%3Aissue+is%3Aopen+label%3Achallenge GitHub issues labeled &amp;quot;challenge&amp;quot;]. This project could implement a whole bunch of challenges one by one and release them over the course of several small releases. This would allow the student to work in a professional Continuous Delivery kind of way while bringing benefit to the Juice Shop over the duration of the project.&lt;br /&gt;
&lt;br /&gt;
''Coming up with good additional ideas for challenges in the proposal could make the difference between being selected or declined as a student for this project!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* 10 or more new challenges for OWASP Juice Shop (including required functional enhancements to place the challenges)&lt;br /&gt;
* Each challenge comes with full functional unit and integration tests&lt;br /&gt;
* Each challenge is verified to be exploitable by corresponding end-to-end tests&lt;br /&gt;
* Hint and solution sections for each new challenge are added to the &amp;quot;Pwning OWASP Juice Shop&amp;quot; ebook&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Hacking Instructor ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
While the Juice Shop is offering a lot of long-lasting motivation and challenges for security experts, it might be a bit daunting for newcomers and less experienced hackers.&lt;br /&gt;
The &amp;quot;Hacking Instructor&amp;quot; as sketched in [https://github.com/bkimminich/juice-shop/issues/440 GitHub issue #440] could guide users from this target audience through at least some of the hacking challenges. As this would be an entirely new and relatively independent feature of the Juice Shop, students should be able to bring in their own creativity and ideas a lot.&lt;br /&gt;
&lt;br /&gt;
''For this project, a good proposal with a design &amp;amp; implementation proposal more sophisticated than the rough ideas in [https://github.com/bkimminich/juice-shop/issues/440 #440] is paramount to be selected as a student!''&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A working implementation of e.g. an avatar-style &amp;quot;Hacking Instructor&amp;quot; or other solution based on the students own proposal&lt;br /&gt;
* Coverage of at least the trivial (1-star) and some easy (2-star) challenges&lt;br /&gt;
* Documentation how to configure or script the &amp;quot;Hacking Instructor&amp;quot; for challenges in general&lt;br /&gt;
&lt;br /&gt;
''' Getting started: '''&lt;br /&gt;
* Get familiar with the architecture and code base of the application's rich Javascript frontend and RESTful backend&lt;br /&gt;
* Get a feeling for the high code &amp;amp; test quality bar by inspecting the existing test suites and static code analysis results&lt;br /&gt;
* Get familiar with the CI/CD process based on Travis-CI and several associated 3rd party services&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular, some UI/UX experience would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
* Jannik Hollenbach - OWASP Juice Shop Project Collaborator&lt;br /&gt;
* Shoeb Patel - OWASP Juice Shop Contributor (and former GSoC 2018 Student)&lt;br /&gt;
&lt;br /&gt;
=== Your idea ===&lt;br /&gt;
&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
You have an awesome idea to improve OWASP Juice Shop that is not on this list? Great, please submit it!&lt;br /&gt;
&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* Get in touch with [https://www.owasp.org/index.php/User:Bjoern_Kimminich Bjoern Kimminich]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* A new feature that makes OWASP Juice Shop even better&lt;br /&gt;
* Code follows existing styleguides and passes all existing quality gates regarding code smells, test coverage etc.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* Javascript, Unit/Integration testing, experience with (or willingness to learn) Angular and NodeJS/Express, some security knowledge would be preferable.&lt;br /&gt;
&lt;br /&gt;
'''Mentors:''' &lt;br /&gt;
* [[User:Bjoern_Kimminich|Bjoern Kimminich]] - OWASP Juice Shop Project Leader&lt;br /&gt;
&lt;br /&gt;
==OWASP-Securetea Tools Project ==&lt;br /&gt;
The purpose of this application is to warn the user (via various communication mechanisms) whenever their laptop accessed. This small application was developed and tested in python in Linux machine is likely to work well on the Raspberry Pi as well. -&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project/blob/master/README.md&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
We are looking any awesome idea to improve Securetea Project that is not on this list? We are expecting make this project will be useful to everyone to secure their Small IoT. &lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Below roadmap and expect  results you can choose to improve Securetea Project . &lt;br /&gt;
if any bugs please help to fix it&lt;br /&gt;
&lt;br /&gt;
===Roadmap=== &lt;br /&gt;
See Our Roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
https://github.com/OWASP/SecureTea-Project#roadmap&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Twitter (done)&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Dashboard / Gui (done)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Protection /firewall&amp;lt;br&amp;gt;&lt;br /&gt;
Securetea Antivirus&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Whatsapp&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by SMS Alerts&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Line&amp;lt;br&amp;gt;&lt;br /&gt;
Notify by Telegram&amp;lt;br&amp;gt;&lt;br /&gt;
Intelligent Log Monitoring&amp;lt;br&amp;gt;&lt;br /&gt;
Login History&amp;lt;br&amp;gt;&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
* Python&lt;br /&gt;
* Javascript &lt;br /&gt;
* Angular and NodeJS/Express&lt;br /&gt;
* Database&lt;br /&gt;
* Linux&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:ade.putra@owasp.org Ade Yoseman Putra] - (OWASP Securetea Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
* [mailto:rejah.rehim@owasp.org Rejah Rehim.A.A]]- (OWASP Securetea Project Leader)&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==OWASP OWTF==&lt;br /&gt;
'''[https://github.com/owtf/owtf Offensive Web Testing Framework (OWTF)]''' is a project focused on penetration testing efficiency and alignment of security tests to security standards like the OWASP Testing Guide (v3 and v4), the OWASP Top 10, PTES and NIST. Most of the ideas below focus on rewrite of some major components of OWTF to make it more modular. OWTF is moving to a fresh codebase with a fully Docker testing and deployment environment. If you want to get a jumpstart, check out https://github.com/owtf/owtf/tree/new-arch.&lt;br /&gt;
===OWASP OWTF - MiTM proxy interception and replay capabilities===&lt;br /&gt;
'''Brief Explanation:'''&lt;br /&gt;
&lt;br /&gt;
The OWTF man-in-the-middle proxy is written completely in Python (based on the excellent Tornado framework) and was benchmarked to be the fastest MiTM python proxy. However it lacks the useful and much need interception and replay capabilities of mitmproxy (https://github.com/mitmproxy/mitmproxy).&lt;br /&gt;
&lt;br /&gt;
The current implementation of the MiTM proxy serves its purpose very well. Its fast but its not extensible. There are a number of good use cases for being extensible&lt;br /&gt;
*ability to intercept the transactions&lt;br /&gt;
*modify or replay transaction on the fly&lt;br /&gt;
*add additional capabilities to the proxy (such as session marking/changing) without polluting the main proxy code&lt;br /&gt;
Bonus:&lt;br /&gt;
*Design and implement a proxy plugin (middleware) architecture so that the plugins can be defined separately and the user can choose what plugins to include dynamically (from the web interface).&lt;br /&gt;
*Replace the current Requester (based on urllib, urllib2) with a more robust Requester based on the new urllib3 with support for a real headless browser factory. The typical flow when requested for an authenticated browser instance (using PhantomJS)&lt;br /&gt;
&lt;br /&gt;
*The &amp;quot;Requester&amp;quot; module checks if there is any login parameters provided (i.e form-based or script - look at https://github.com/owtf/login-sessions-plugin)&lt;br /&gt;
*Create a browser instance and do the necessary login procedure&lt;br /&gt;
*Handle the browser for the URI&lt;br /&gt;
*When called to close the browser, do a clean logout and kill the browser instance.&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
'''Knowledge Prerequisite:''' Python proficiency, some previous exposure to security concepts and penetration testing is welcome but not strictly necessary as long as there is will to learn.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - Web interface enhancements===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current web interface is a mixture of Tornado Jinja templates and ReactJS. A complete UI change to a stable ReactJS-based interface should be the deliverable for this project.  Most of the hard part for the change has already been done and added in a separate branch at https://github.com/owtf/owtf/tree/develop.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT:Clean, maintainable (ES6 compatible and using recommended design patterns) React (JavaScript) code. ([https://github.com/getsentry/zeus/tree/master/webapp This] is a good example!)'''&lt;br /&gt;
*'''IMPORTANT: Thoroughly documented code along with API examples and example future components.'''&lt;br /&gt;
*'''CRITICAL''': Excellent reliability and performance.&lt;br /&gt;
*Unit tests / Functional tests and easy to setup testing environment (preferably automated).&lt;br /&gt;
'''Knowledge Prerequisite:''' Python (reading API source code and endpoints), React.JS (high proficiency) and general JavaScript proficiency.&lt;br /&gt;
&lt;br /&gt;
'''OWASP OWTF Mentors:''' Contact: [mailto:Abraham.Aranguren@owasp.org Abraham Aranguren][mailto:viyat.bhalodia@owasp.org Viyat Bhalodia][mailto:bharadwaj.machiraju@gmail.com Bharadwaj Machiraju] OWASP OWTF Project Leaders&lt;br /&gt;
===OWASP OWTF - New plugin architecture===&lt;br /&gt;
'''Brief explanation:'''&lt;br /&gt;
&lt;br /&gt;
The current plugin system is not very useful and it is painful to browse many plugins. Most of the plugins do have much code and most of is repeated - much refactoring needed there.&lt;br /&gt;
&lt;br /&gt;
This issue is documented in detail at https://github.com/owtf/owtf/issues/905.&lt;br /&gt;
&lt;br /&gt;
For background on OWASP OWTF please see: https://www.owasp.org/index.php/OWASP_OWTF&lt;br /&gt;
&lt;br /&gt;
'''Expected results:'''&lt;br /&gt;
*'''IMPORTANT: [http://legacy.python.org/dev/peps/pep-0008/ PEP-8 compliant code] in all modified code and surrounding areas.'''&lt;br /&gt;
*'''IMPORTANT: [https://github.com/7a/owtf/wiki/Contributor%27s-README OWTF contributor README compliant code]'''&lt;br /&gt;
*'''IMPORTANT: [http://sphinx-doc.org/ Sphinx-friendly python comments] [http://owtf.github.io/ptp/_modules/ptp/tools/w3af/parser.html#W3AFXMLParser example Sphinx-friendly python comments here]'''&lt;br /&gt;
*CRITICAL: Excellent reliability&lt;br /&gt;
*Good performance&lt;br /&gt;
*Unit tests / Functional tests&lt;br /&gt;
*Good documentation&lt;br /&gt;
&lt;br /&gt;
== OWASP iGoat (draft) ==&lt;br /&gt;
'''Idea 1:''' Completing OWASP iGoat documentation at https://docs.igoatapp.com/ and creating demo videos at for OWASP iGoat YouTube channel for learning purpose.&lt;br /&gt;
&lt;br /&gt;
'''Idea 2:''' Adding new challenge pack / CTF for iGoat. It should be one point solution for learning iOS app security&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
[[OWASP SeraphimDroid Project|OWASP Seraphimdroid]] is Android security and privacy app, with features to enhance user's knowledge about security and privacy on his/her mobile device. If you are interested in this project and working on it during Google Summer of Code, please contact [[User:Nikola Milosevic|Nikola Milosevic]] and express your interest.&lt;br /&gt;
&lt;br /&gt;
=== Idea 1: Anomaly detection of device state ===&lt;br /&gt;
The idea is that certain features of a device would be constantly monitored (battery use, internet usage, opp calls, etc.). Initially, the usual behaviour of the device would be learned. Later, anomalies normal behavior would be reported to the user. This should involve some explanations, such as which applications are causing an anomaly the device behaviors &lt;br /&gt;
&lt;br /&gt;
=== Idea 2: On device machine learning of maliciousness of an app ===&lt;br /&gt;
Tensor-flow for on-device processing and some other libraries have been released that enable machine learning. We have previously applied a system, that based on permissions, is able to distinguish malicious apps from non-malicious. Now, we would like to learn also from other outputs and things one can monitor about application whether it can be malicious. &lt;br /&gt;
&lt;br /&gt;
=== Idea 3:  Enhansing privacy features ===&lt;br /&gt;
The vision of Seraphimdroid is to be aware of privacy threats. This may be achieved throug knowing which applications are using user accounts or other information that uthe user has on phone to send to the server, or just by knowing which applications may be doing it. Knowledgebase shouldbbeextending with the suggestions on how to improve privacy. Also, automated settings of various apps to use encryption should be proposed.&lt;br /&gt;
==OWASP ZAP==&lt;br /&gt;
[[OWASP Zed Attack Proxy Project]] (ZAP) The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers. Previous GSoC students have implemented key parts of the ZAP core functionality and have been offered (and accepted) jobs based on their work on ZAP.&lt;br /&gt;
&lt;br /&gt;
=== Active Scanning WebSockets ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: ZAP has good support for websockets, and allows them to be intercepted, changed and fuzzed. Unfortunately it doesn't currently support active scanning (automated attacking) of websocket traffic (messages).&lt;br /&gt;
: We would like to add active scanning support to websockets, ideally in a generic way which would allow us to reuse as many of our existing rules as are relevant. Adding additional websocket specific attacks would also be very useful.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* An pluggable infrastructure that allows us to active scan websockets&lt;br /&gt;
:* Converting the relevant existing scan rules to work with websockets&lt;br /&gt;
:* Implementing new websocket specific scan rules&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
&lt;br /&gt;
=== Automated Authentication Detection and Configuration ===&lt;br /&gt;
: '''Brief Explanation:'''&lt;br /&gt;
: Currently a user must manually configure ZAP to handle authentication, eg as per &amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/wiki/FAQformauth&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
: This is time consuming and error prone.&lt;br /&gt;
: Ideally ZAP would help detect login and registration pages and provide more assistance when configuring authentication, ideally being able to completely automate the task for as many sort of webapps as possible.&lt;br /&gt;
: This project will be a continuation of the work that was started as part of last year's GSoC.&lt;br /&gt;
: '''Expected Results:'''&lt;br /&gt;
:* Detect login and registration pages&lt;br /&gt;
:* Provide a wizard to walk users through the process of setting up authentication, with as much assistance as possible&lt;br /&gt;
:* An option to completely automate the authentication process, for as many authentication mechanisms as possible&lt;br /&gt;
: '''Getting Started:''' &lt;br /&gt;
:* Have a look at the ZAP [https://github.com/zaproxy/zaproxy/blob/develop/CONTRIBUTING.md CONTRIBUTING.md] file, especially the 'Coding' section.&lt;br /&gt;
:* We like to see students who have already contributed to ZAP, so try fixing one of the bugs flagged as [https://github.com/zaproxy/zaproxy/issues?q=is%3Aopen+is%3Aissue+label%3AIdealFirstBug IdealFirstBug].&lt;br /&gt;
: '''Knowledge Prerequisites:'''&lt;br /&gt;
:* ZAP is written in Java, so a good knowledge of this language is recommended. Some knowledge of application security would be useful, but not essential.&lt;br /&gt;
: '''Mentors:''' [https://www.owasp.org/index.php/User:Psiinon Simon Bennetts] [mailto:psiinon@gmail.com @] and the rest of the ZAP Core Team&lt;br /&gt;
:&lt;br /&gt;
&lt;br /&gt;
== IoT Goat ==&lt;br /&gt;
IoT Goat will be a deliberately insecure firmware based on OpenWrt. The project’s goal is to teach users about the most common vulnerabilities typically found in IoT devices. The vulnerabilities will be based on the [https://www.owasp.org/images/1/1c/OWASP-IoT-Top-10-2018-final.pdf IoT Top 10 2018]. &lt;br /&gt;
&lt;br /&gt;
===Insecure web services/application===&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* [https://github.com/scriptingxss/IoTGoat/blob/master/README.md Get familiar with OpenWrt]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Web services deployed in OpenWRT containing critical vulnerabilities showcasing the traditional IoT problems. It must contain the following vulnerabilities to be used with the IoT testing guide: SQL injection, local inclusion and XXE injection (I1), Insufficient Authentication (I2), transfer sensitive information using insecure channels (I4).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* OpenWRT&lt;br /&gt;
* Web security&lt;br /&gt;
* Embedded Security&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
===Insecure services===&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* [https://github.com/scriptingxss/IoTGoat/blob/master/README.md Get familiar with OpenWrt]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Create/Install/Document network services with security vulnerabilities and insecure configurations that can be abused during the challenges.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* OpenWRT&lt;br /&gt;
* Network security&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
===Insecure web services/application===&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* [https://github.com/scriptingxss/IoTGoat/blob/master/README.md Get familiar with OpenWrt]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* Web services deployed in OpenWRT containing critical vulnerabilities showcasing the traditional IoT problems. It must contain the following vulnerabilities to be used with the IoT testing guide: SQL injection, local inclusion and XXE injection (I1), Insufficient Authentication (I2), transfer sensitive information using insecure channels (I4).&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* OpenWRT&lt;br /&gt;
* Web security&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
===Insecure Android/iOS application===&lt;br /&gt;
''' Getting started '''&lt;br /&gt;
* [https://github.com/scriptingxss/IoTGoat/blob/master/README.md Get familiar with OpenWrt]&lt;br /&gt;
&lt;br /&gt;
'''Expected Results:'''&lt;br /&gt;
* .Android application containing client and server side vulnerabilities covering the OWASP TOP 10 Mobile Risks.&lt;br /&gt;
* iOS application containing client and server side vulnerabilities covering the OWASP TOP 10 Mobile Risks.&lt;br /&gt;
* Web Services deployed as a service in OpenWrt to be used by the Android/iOS clients.&lt;br /&gt;
&lt;br /&gt;
'''Knowledge Prerequisites:'''&lt;br /&gt;
* OpenWRT&lt;br /&gt;
* Mobile security knowledge.&lt;br /&gt;
* Mobile/Web development knowledge.&lt;br /&gt;
&lt;br /&gt;
'''Potential Mentors:'''&lt;br /&gt;
* Aaron Guzman - OWASP IoT Goat Contributor (Project leader of the IoT and Embedded AppSec project)&lt;br /&gt;
* Fotios Chantzis - OWASP IoT Goat Contributor (and former GSoC Student/GSoc Mentor)&lt;br /&gt;
* [[User:Calderpwn|Paulino Calderon]] - OWASP IoT Goat Contributor (and former GSoC 2011 Student/GSoc Mentor in 2015 and 2017)&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;br /&gt;
&lt;br /&gt;
==OWASP Web Honeypot Project ==&lt;br /&gt;
&lt;br /&gt;
The goal of the OWASP Honeypot Project is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
https://www.owasp.org/index.php/OWASP_Honeypot_Project&lt;br /&gt;
&lt;br /&gt;
https://github.com/OWASP/Honeypot-Project/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Brief Explanation===&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed. &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Idea===&lt;br /&gt;
Project progression: &lt;br /&gt;
* Honeypot software. The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
* Collection software. The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
* Rollout to the Community. The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
* Going Forward. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Expect  Results ===&lt;br /&gt;
&lt;br /&gt;
Some of the ideas from last year's summit&lt;br /&gt;
&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project(https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Students Requirements ===&lt;br /&gt;
&lt;br /&gt;
Some of the skills we are looking for:&lt;br /&gt;
&lt;br /&gt;
* Apache/Tomcat &lt;br /&gt;
* Any experience of MISP&lt;br /&gt;
* MySQL &amp;amp; JSON&lt;br /&gt;
* ELK &lt;br /&gt;
* STIX/TAXII&lt;br /&gt;
* Python&lt;br /&gt;
* ModSecurity/mlogc&lt;br /&gt;
* OWASP Core RuleSet (CRS)&lt;br /&gt;
* Linux&lt;br /&gt;
* VM/Docker&lt;br /&gt;
&lt;br /&gt;
=== Mentors === &lt;br /&gt;
&lt;br /&gt;
* [mailto:adrian.winckles@owasp.org  Adrian Winckles] - (OWASP Web Honeypot Project Leader) &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
===Suggest your own ideas===&lt;br /&gt;
&lt;br /&gt;
You may suggest additional challenges or ideas that fit this project's objectives.&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=247652</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=247652"/>
				<updated>2019-02-19T00:37:35Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:Seconds_out_2018_AI_&amp;amp;_ML_40_min_version.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Seconds_out_2018_AI_%26_ML_40_min_version.pdf&amp;diff=247651</id>
		<title>File:Seconds out 2018 AI &amp; ML 40 min version.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Seconds_out_2018_AI_%26_ML_40_min_version.pdf&amp;diff=247651"/>
				<updated>2019-02-19T00:35:34Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=247537</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=247537"/>
				<updated>2019-02-15T11:46:25Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: jkhu&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Etienne Greeff&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=247026</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=247026"/>
				<updated>2019-02-01T23:19:02Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: added matt&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|4 December 2018&lt;br /&gt;
|Matthew Lorentzen&lt;br /&gt;
|[[Media:From_battlefield_to_bunker_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:From_battlefield_to_bunker_v1-0.pdf&amp;diff=247025</id>
		<title>File:From battlefield to bunker v1-0.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:From_battlefield_to_bunker_v1-0.pdf&amp;diff=247025"/>
				<updated>2019-02-01T23:13:01Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=246901</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=246901"/>
				<updated>2019-01-29T10:34:03Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: latest presos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=&amp;quot;OWASP-Cambridge-Meetup&amp;quot; /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|24 January 2019&lt;br /&gt;
|Simon Newman&lt;br /&gt;
|[[Media:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf&amp;diff=246900</id>
		<title>File:Botprobe - Reducing Network Threat Intelligence Big Data v0-1 .pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Botprobe_-_Reducing_Network_Threat_Intelligence_Big_Data_v0-1_.pdf&amp;diff=246900"/>
				<updated>2019-01-29T10:32:43Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf&amp;diff=246899</id>
		<title>File:Cyber Threat Intelligence Day (Anglia Ruskin University).pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Cyber_Threat_Intelligence_Day_(Anglia_Ruskin_University).pdf&amp;diff=246899"/>
				<updated>2019-01-29T10:24:02Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=246075</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=246075"/>
				<updated>2018-12-15T12:26:26Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open Security Summit Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 Conference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2018, the  priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project&lt;br /&gt;
* (https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of the &amp;lt;strong&amp;gt;Web Honeypot Project &amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
* Coding aspects of CRS/JSON&lt;br /&gt;
* Working on Component Integration &lt;br /&gt;
* Deploying a Honeypot/Probe&lt;br /&gt;
* Testing&lt;br /&gt;
&lt;br /&gt;
=Project Participants=&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
* Mark Graham&lt;br /&gt;
* Andrew Moore&lt;br /&gt;
* Artur Zaremba (Intern)&lt;br /&gt;
* [https://www.owasp.org/index.php/Special:Contributions/Felipe_Zipitria Felipe Zipitria]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Tin_Zaw Tin Zaw]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ali_Razmjoo Ali Razmjoo]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=245013</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=245013"/>
				<updated>2018-11-09T13:17:03Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: updated presentations&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=“OWASP-Cambridge-Meetup” /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Adrian Winckles&lt;br /&gt;
|[[Media:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|6 November 2018&lt;br /&gt;
|Dr Grigorios Fragkos&lt;br /&gt;
|[[Media:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf&amp;diff=245012</id>
		<title>File:OWASP Cambridge - 6Nov2018 - G.Fragkos.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Cambridge_-_6Nov2018_-_G.Fragkos.pdf&amp;diff=245012"/>
				<updated>2018-11-09T12:27:39Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf&amp;diff=245011</id>
		<title>File:OWASP Cambridge Talk - Application Honeypot Threat Intelligence v1-0.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Cambridge_Talk_-_Application_Honeypot_Threat_Intelligence_v1-0.pdf&amp;diff=245011"/>
				<updated>2018-11-09T12:25:30Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=244770</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=244770"/>
				<updated>2018-10-31T15:58:42Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: added SM&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;Join our [https://www.meetup.com/OWASP-Cambridge-Meetup/ MeetUp]!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Follow us on  [http://twitter.com/#!/owaspcambs Twitter]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Talk to us on [https://owasp.slack.com/app_redirect?channel=chapter-cambridge Slack]&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meet up page: http://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;meetup group=“OWASP-Cambridge-Meetup” /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=244721</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=244721"/>
				<updated>2018-10-30T12:40:08Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: tabs&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
123&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- first tab-&amp;gt;&lt;br /&gt;
= Local News =&lt;br /&gt;
&lt;br /&gt;
== Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster “Capture the Flag Event” 2018 ==&lt;br /&gt;
&lt;br /&gt;
=== Thursday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; May 2018 5:30 – 21:30, Compass House (COM014), Anglia Ruskin University, Cambridge, CB5 8DZ ===&lt;br /&gt;
&lt;br /&gt;
==== Hosted by the Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University, British Computer Society (BCS) Cybercrime Forensics Special Internet Group’s, UK Cyber Security Forum Cambridge Cluster and OWASP (Open Web Application Security Project) Cambridge Chapter. ====&lt;br /&gt;
CTF (Capture The Flag) is a type of computer security competition. Contestants are presented with a set of challenges and puzzles which test their creativity, technical coding (and googling) skills, and problem-solving ability. Challenges usually cover a number of categories and when solved, each yields a “flag” which is submitted to a real-time scoring service. The difficulty levels are from beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CTF tournaments are a great and fun way for software developers to learn a wide array of application security skills in a safe and legal environment.&lt;br /&gt;
&lt;br /&gt;
Top scorers will win prizes kindly donated by cyber security technology vendors.&lt;br /&gt;
&lt;br /&gt;
Most programming languages supported.&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT''': Please bring your '''own LAPTOP''' and a charger for the event.&lt;br /&gt;
&lt;br /&gt;
=== '''Background''' ===&lt;br /&gt;
The British Computer Society (BCS) Cybercrime Forensics Special Interest Group (SIG) promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professionals, lawyers, law enforcement officers, academics and those interested in the use of Cybercrime Forensics and the need to address cybercrime for the benefit of those groups and of the wider public.&lt;br /&gt;
&lt;br /&gt;
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.&lt;br /&gt;
&lt;br /&gt;
The '''Cyber Security and Networking''' ('''CSN''') Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organisations such as OWASP, BCS, ISC2, IISP &amp;amp; the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber attacks and educate its users for a more secure cyberspace and operational business environment. These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and neutralising attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs.&lt;br /&gt;
&lt;br /&gt;
The '''Cambridge Cyber Security Cluster''' is an affiliate '''UK Cyber Security Forum''', a government and industry led partnership which will look at how the region can develop the skills and infrastructure to combat cyber security threats.&lt;br /&gt;
&lt;br /&gt;
=== '''Speaker Biographies''' ===&lt;br /&gt;
&lt;br /&gt;
'''Goher Mohammad - Head of Security Engineering for Leadership Team at Photobox Group Security'''&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
Making his mark as one of the youngest IT leaders in Omnicom Group back in 2004, Goher has a huge passion for IT with a particular drive not just do things well but do things better. Having had to deal with more comprehensive but secure and controlled structures in Citibank and Merrill Corporation to more agile environments within Omnicomgroup and now Photobox Group, the next step for him is how to combine the best of both worlds. A keen diver, traveller keen to explore the world, Goher also loves play retro video games and not so secretly is a complete tech geek. Deep down, his inquisitive nature is always looking to understand the inner workings of everything that’s around and in turn, how can it be made better. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
In an ever changing IT world with increased velocity of evolution, we have several challenges we need to deal with. One of which is how the hell do we keep up with the change. Scaling security workflows is an interesting challenge but need not be complex as you may have the tools you need already at your disposal. The second is how do we individually get noticed by talent finders and recruiters. Crowd sourced based security teams may well be the solution to your problems.&lt;br /&gt;
&lt;br /&gt;
=== '''Provisional Agenda''' ===&lt;br /&gt;
18:00 – 18:45:  Registration, Pizza &amp;amp; Beer (Compass House Foyer/Cafe)&lt;br /&gt;
&lt;br /&gt;
18:45 – 19:00 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Director of Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University, (LAB002)&lt;br /&gt;
&lt;br /&gt;
19:00 – 19:30 Guest Speaker - - Goher Mohammad – Head of Security Engineering, Photobox, “Scaling Security Workflows &amp;amp; How to be Hired for a Crowd Sourcing Security Team”&lt;br /&gt;
&lt;br /&gt;
19:30 – 21:30 Capture the Flag – OWASP Challenges&lt;br /&gt;
&lt;br /&gt;
=== '''Registration''' ===&lt;br /&gt;
'''Participation is Free but the number of seats is strictly limited so reservation is recommended.'''&lt;br /&gt;
&lt;br /&gt;
To register for this free event, please register online at&lt;br /&gt;
&lt;br /&gt;
https://goo.gl/azYnp3&lt;br /&gt;
&lt;br /&gt;
The event will be held in the Compass House Building, Room COM014/COM109 (Café in the foyer for networking &amp;amp; refreshments).&lt;br /&gt;
&lt;br /&gt;
Anglia Ruskin University&lt;br /&gt;
&lt;br /&gt;
Compass House (COM014/109)&lt;br /&gt;
&lt;br /&gt;
104 East Road&lt;br /&gt;
&lt;br /&gt;
Cambridge&lt;br /&gt;
&lt;br /&gt;
Cambridgeshire&lt;br /&gt;
&lt;br /&gt;
CB5 8DZ&lt;br /&gt;
&lt;br /&gt;
Please note that there is no parking on campus. Get further information on travelling to the university.&lt;br /&gt;
&lt;br /&gt;
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html&lt;br /&gt;
&lt;br /&gt;
=='''OWASP Cambridge Spring Chapter Meeting -Tuesday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; April 2018'''==&lt;br /&gt;
&lt;br /&gt;
Tuesday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; April 2018 17:30 – 20:30, Lord Ashcroft Building (LAB002/LAB006), Anglia Ruskin University, Cambridge.&lt;br /&gt;
&lt;br /&gt;
Hosted by the Cyber Security Networking  &amp;amp; Big Data Research Group, Anglia Ruskin University, and OWASP (Open Web Application Security Project) Cambridge Chapter&lt;br /&gt;
&lt;br /&gt;
This evening is part of a series of evening events on raising awareness for local  businesses &amp;amp; organisations on the issues of cyber security and cybercrime, what regulations and legislation do organisations need to be aware to protect themselves and what is considered best practice in these challenging times.&lt;br /&gt;
&lt;br /&gt;
'''Background''' &lt;br /&gt;
&lt;br /&gt;
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.&lt;br /&gt;
&lt;br /&gt;
The '''Cyber Security, Networking &amp;amp; Big Data''' ('''CSNBD''') Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organisations such as OWASP, BCS, ISC2, IISP &amp;amp; the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber attacks and educate its users for a more secure cyberspace and operational business environment.  These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and neutralising attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Biographies &amp;amp; Abstracts'''&lt;br /&gt;
&lt;br /&gt;
==== Guest Speaker: Jonathon Brookfield –Security Research Group Director, Blackberry ====&lt;br /&gt;
'''Bio:''' &lt;br /&gt;
&lt;br /&gt;
Jonathon Brookfield leads the Security Research Group at BlackBerry. He has been working in product security for over 12 years, with the last 6 years at BlackBerry. At BlackBerry he has been involved in improving the security of a range of products including BlackBerry OS, BlackBerry 10 and most recently the PRIV on the device side and BlackBerry ID and Enterprise Identity by BlackBerry on the services side.&lt;br /&gt;
&lt;br /&gt;
==== Abstract: ''“Security OAuth 2.0”'' ====&lt;br /&gt;
Enterprise authentication and single sign-on is a frequently overlooked subject by developers and security testers and is often relegated to something that &amp;quot;just works&amp;quot; or stands in the way of accessing the application being assessed. As such, the finer details are frequently ignored or left to third-party libraries to implement. This talk aims to help penetration testers and developers understand OAuth 2.0 protocol, detailing its components, configurations and modes of operation. Common implementation pitfalls will be explored from first-hand experience of securing OAuth in the enterprise, and an example will be demonstrated of how a mistake in the implementation can lead to a compromise of applications relying on OAuth for authorisation.&lt;br /&gt;
&lt;br /&gt;
'''Guest Speaker: Marc Wickenden, CEO, 4Armed.'''&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Marc cut his teeth looking after applications and infrastructure for various online financial services companies before venturing into consultancy and ultimately founding 4ARMED, a company focused on appsec and cloud computing. He part Dev, part Sec, part Ops (the cool kids call this DevSecOps I think) and his latest squeeze is all things Docker and Kubernetes.&lt;br /&gt;
&lt;br /&gt;
'''Abstract: ''“XXE - The Bug That Bit Me”'''''&lt;br /&gt;
&lt;br /&gt;
XXE and me have history. It taught me a valuable lesson and we’ve been friends ever since. It’s prolific yet still relatively unknown outside security testing circles.&lt;br /&gt;
&lt;br /&gt;
It was a new addition to the OWASP Top Ten in 2017 and is unique compared to the other entries. In this talk I’ll explain why, provide live demonstrations of how to find and exploit it based on real world examples I’ve found, show what it’s impact can be and ultimately give you some tips to avoid it.&lt;br /&gt;
&lt;br /&gt;
'''Provisional Agenda'''  &lt;br /&gt;
&lt;br /&gt;
17:30  – 18:15 Registration &amp;amp; Refreshments (LAB006)&lt;br /&gt;
&lt;br /&gt;
18:15 – 18:30 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Director of Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University – Overview of OWASP AppSec 2018 – London July 2&amp;lt;sup&amp;gt;nd&amp;lt;/sup&amp;gt; – 6&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; &amp;amp; OWASP Open Security Summit 4&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; – 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; June 2018.&lt;br /&gt;
&lt;br /&gt;
==== 18:30 – 19:15 “''Security OAuth 2.0''&amp;quot; - Jonathon Brookfield –Security Research Group Director, Blackberry ====&lt;br /&gt;
&lt;br /&gt;
==== 19:15 – 20:00 “''XXE - The Bug That Bit Me''.”- Marc Wickenden, CEO, 4Armed. ====&lt;br /&gt;
20:00 – 20:15 Q &amp;amp; A &amp;amp; Close&lt;br /&gt;
&lt;br /&gt;
'''Registration''' &lt;br /&gt;
&lt;br /&gt;
To register for this free event, please register online at&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-cambridge-spring-chapter-meeting-tuesday-17th-april-2018-tickets-44728540268&lt;br /&gt;
&lt;br /&gt;
The event will be held in the Lord Ashcroft Building, Room LAB002 (Breakout Room LAB006 for networking &amp;amp; refreshments).&lt;br /&gt;
&lt;br /&gt;
Please enter through the Helmore Building and ask at reception.&lt;br /&gt;
&lt;br /&gt;
Anglia Ruskin University&lt;br /&gt;
&lt;br /&gt;
Cambridge Campus&lt;br /&gt;
&lt;br /&gt;
East Road&lt;br /&gt;
&lt;br /&gt;
Cambridge&lt;br /&gt;
&lt;br /&gt;
CB1 1PT&lt;br /&gt;
&lt;br /&gt;
Please note that there is no parking on campus. Get further information on travelling to the university.&lt;br /&gt;
&lt;br /&gt;
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html&lt;br /&gt;
----&lt;br /&gt;
'''Planned dates for upcoming events'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|Cambridge_OWASP  Event 20170927 - Secure Coding Challenge&lt;br /&gt;
|11/09/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP/BCS Cybercrime Forensics &amp;amp; Social Media  Forensics Day Event &lt;br /&gt;
|11/10/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; BCS East Anglia Event - GDPR Evening&lt;br /&gt;
|07/11/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; UK Cyber Security Forum GDPR Event  20171115&lt;br /&gt;
|15/11/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event 20171205&lt;br /&gt;
|05/12/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; BCS Cybercrime Forensics/IoT Forensics  Security Day &lt;br /&gt;
|10/01/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; UK Cyber Security Forum Cyber Machine  Learning Day &lt;br /&gt;
|18/01/2018,&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|13/02/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|13/03/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event&lt;br /&gt;
|17/04/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|08/05/2018&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=244720</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=244720"/>
				<updated>2018-10-30T12:34:18Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: ?&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
Demo&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- first tab-&amp;gt;&lt;br /&gt;
= Local News =&lt;br /&gt;
&lt;br /&gt;
== Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster “Capture the Flag Event” 2018 ==&lt;br /&gt;
&lt;br /&gt;
=== Thursday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; May 2018 5:30 – 21:30, Compass House (COM014), Anglia Ruskin University, Cambridge, CB5 8DZ ===&lt;br /&gt;
&lt;br /&gt;
==== Hosted by the Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University, British Computer Society (BCS) Cybercrime Forensics Special Internet Group’s, UK Cyber Security Forum Cambridge Cluster and OWASP (Open Web Application Security Project) Cambridge Chapter. ====&lt;br /&gt;
CTF (Capture The Flag) is a type of computer security competition. Contestants are presented with a set of challenges and puzzles which test their creativity, technical coding (and googling) skills, and problem-solving ability. Challenges usually cover a number of categories and when solved, each yields a “flag” which is submitted to a real-time scoring service. The difficulty levels are from beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CTF tournaments are a great and fun way for software developers to learn a wide array of application security skills in a safe and legal environment.&lt;br /&gt;
&lt;br /&gt;
Top scorers will win prizes kindly donated by cyber security technology vendors.&lt;br /&gt;
&lt;br /&gt;
Most programming languages supported.&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT''': Please bring your '''own LAPTOP''' and a charger for the event.&lt;br /&gt;
&lt;br /&gt;
=== '''Background''' ===&lt;br /&gt;
The British Computer Society (BCS) Cybercrime Forensics Special Interest Group (SIG) promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professionals, lawyers, law enforcement officers, academics and those interested in the use of Cybercrime Forensics and the need to address cybercrime for the benefit of those groups and of the wider public.&lt;br /&gt;
&lt;br /&gt;
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.&lt;br /&gt;
&lt;br /&gt;
The '''Cyber Security and Networking''' ('''CSN''') Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organisations such as OWASP, BCS, ISC2, IISP &amp;amp; the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber attacks and educate its users for a more secure cyberspace and operational business environment. These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and neutralising attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs.&lt;br /&gt;
&lt;br /&gt;
The '''Cambridge Cyber Security Cluster''' is an affiliate '''UK Cyber Security Forum''', a government and industry led partnership which will look at how the region can develop the skills and infrastructure to combat cyber security threats.&lt;br /&gt;
&lt;br /&gt;
=== '''Speaker Biographies''' ===&lt;br /&gt;
&lt;br /&gt;
'''Goher Mohammad - Head of Security Engineering for Leadership Team at Photobox Group Security'''&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
Making his mark as one of the youngest IT leaders in Omnicom Group back in 2004, Goher has a huge passion for IT with a particular drive not just do things well but do things better. Having had to deal with more comprehensive but secure and controlled structures in Citibank and Merrill Corporation to more agile environments within Omnicomgroup and now Photobox Group, the next step for him is how to combine the best of both worlds. A keen diver, traveller keen to explore the world, Goher also loves play retro video games and not so secretly is a complete tech geek. Deep down, his inquisitive nature is always looking to understand the inner workings of everything that’s around and in turn, how can it be made better. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
In an ever changing IT world with increased velocity of evolution, we have several challenges we need to deal with. One of which is how the hell do we keep up with the change. Scaling security workflows is an interesting challenge but need not be complex as you may have the tools you need already at your disposal. The second is how do we individually get noticed by talent finders and recruiters. Crowd sourced based security teams may well be the solution to your problems.&lt;br /&gt;
&lt;br /&gt;
=== '''Provisional Agenda''' ===&lt;br /&gt;
18:00 – 18:45:  Registration, Pizza &amp;amp; Beer (Compass House Foyer/Cafe)&lt;br /&gt;
&lt;br /&gt;
18:45 – 19:00 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Director of Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University, (LAB002)&lt;br /&gt;
&lt;br /&gt;
19:00 – 19:30 Guest Speaker - - Goher Mohammad – Head of Security Engineering, Photobox, “Scaling Security Workflows &amp;amp; How to be Hired for a Crowd Sourcing Security Team”&lt;br /&gt;
&lt;br /&gt;
19:30 – 21:30 Capture the Flag – OWASP Challenges&lt;br /&gt;
&lt;br /&gt;
=== '''Registration''' ===&lt;br /&gt;
'''Participation is Free but the number of seats is strictly limited so reservation is recommended.'''&lt;br /&gt;
&lt;br /&gt;
To register for this free event, please register online at&lt;br /&gt;
&lt;br /&gt;
https://goo.gl/azYnp3&lt;br /&gt;
&lt;br /&gt;
The event will be held in the Compass House Building, Room COM014/COM109 (Café in the foyer for networking &amp;amp; refreshments).&lt;br /&gt;
&lt;br /&gt;
Anglia Ruskin University&lt;br /&gt;
&lt;br /&gt;
Compass House (COM014/109)&lt;br /&gt;
&lt;br /&gt;
104 East Road&lt;br /&gt;
&lt;br /&gt;
Cambridge&lt;br /&gt;
&lt;br /&gt;
Cambridgeshire&lt;br /&gt;
&lt;br /&gt;
CB5 8DZ&lt;br /&gt;
&lt;br /&gt;
Please note that there is no parking on campus. Get further information on travelling to the university.&lt;br /&gt;
&lt;br /&gt;
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html&lt;br /&gt;
&lt;br /&gt;
=='''OWASP Cambridge Spring Chapter Meeting -Tuesday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; April 2018'''==&lt;br /&gt;
&lt;br /&gt;
Tuesday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; April 2018 17:30 – 20:30, Lord Ashcroft Building (LAB002/LAB006), Anglia Ruskin University, Cambridge.&lt;br /&gt;
&lt;br /&gt;
Hosted by the Cyber Security Networking  &amp;amp; Big Data Research Group, Anglia Ruskin University, and OWASP (Open Web Application Security Project) Cambridge Chapter&lt;br /&gt;
&lt;br /&gt;
This evening is part of a series of evening events on raising awareness for local  businesses &amp;amp; organisations on the issues of cyber security and cybercrime, what regulations and legislation do organisations need to be aware to protect themselves and what is considered best practice in these challenging times.&lt;br /&gt;
&lt;br /&gt;
'''Background''' &lt;br /&gt;
&lt;br /&gt;
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.&lt;br /&gt;
&lt;br /&gt;
The '''Cyber Security, Networking &amp;amp; Big Data''' ('''CSNBD''') Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organisations such as OWASP, BCS, ISC2, IISP &amp;amp; the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber attacks and educate its users for a more secure cyberspace and operational business environment.  These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and neutralising attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Biographies &amp;amp; Abstracts'''&lt;br /&gt;
&lt;br /&gt;
==== Guest Speaker: Jonathon Brookfield –Security Research Group Director, Blackberry ====&lt;br /&gt;
'''Bio:''' &lt;br /&gt;
&lt;br /&gt;
Jonathon Brookfield leads the Security Research Group at BlackBerry. He has been working in product security for over 12 years, with the last 6 years at BlackBerry. At BlackBerry he has been involved in improving the security of a range of products including BlackBerry OS, BlackBerry 10 and most recently the PRIV on the device side and BlackBerry ID and Enterprise Identity by BlackBerry on the services side.&lt;br /&gt;
&lt;br /&gt;
==== Abstract: ''“Security OAuth 2.0”'' ====&lt;br /&gt;
Enterprise authentication and single sign-on is a frequently overlooked subject by developers and security testers and is often relegated to something that &amp;quot;just works&amp;quot; or stands in the way of accessing the application being assessed. As such, the finer details are frequently ignored or left to third-party libraries to implement. This talk aims to help penetration testers and developers understand OAuth 2.0 protocol, detailing its components, configurations and modes of operation. Common implementation pitfalls will be explored from first-hand experience of securing OAuth in the enterprise, and an example will be demonstrated of how a mistake in the implementation can lead to a compromise of applications relying on OAuth for authorisation.&lt;br /&gt;
&lt;br /&gt;
'''Guest Speaker: Marc Wickenden, CEO, 4Armed.'''&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Marc cut his teeth looking after applications and infrastructure for various online financial services companies before venturing into consultancy and ultimately founding 4ARMED, a company focused on appsec and cloud computing. He part Dev, part Sec, part Ops (the cool kids call this DevSecOps I think) and his latest squeeze is all things Docker and Kubernetes.&lt;br /&gt;
&lt;br /&gt;
'''Abstract: ''“XXE - The Bug That Bit Me”'''''&lt;br /&gt;
&lt;br /&gt;
XXE and me have history. It taught me a valuable lesson and we’ve been friends ever since. It’s prolific yet still relatively unknown outside security testing circles.&lt;br /&gt;
&lt;br /&gt;
It was a new addition to the OWASP Top Ten in 2017 and is unique compared to the other entries. In this talk I’ll explain why, provide live demonstrations of how to find and exploit it based on real world examples I’ve found, show what it’s impact can be and ultimately give you some tips to avoid it.&lt;br /&gt;
&lt;br /&gt;
'''Provisional Agenda'''  &lt;br /&gt;
&lt;br /&gt;
17:30  – 18:15 Registration &amp;amp; Refreshments (LAB006)&lt;br /&gt;
&lt;br /&gt;
18:15 – 18:30 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Director of Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University – Overview of OWASP AppSec 2018 – London July 2&amp;lt;sup&amp;gt;nd&amp;lt;/sup&amp;gt; – 6&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; &amp;amp; OWASP Open Security Summit 4&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; – 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; June 2018.&lt;br /&gt;
&lt;br /&gt;
==== 18:30 – 19:15 “''Security OAuth 2.0''&amp;quot; - Jonathon Brookfield –Security Research Group Director, Blackberry ====&lt;br /&gt;
&lt;br /&gt;
==== 19:15 – 20:00 “''XXE - The Bug That Bit Me''.”- Marc Wickenden, CEO, 4Armed. ====&lt;br /&gt;
20:00 – 20:15 Q &amp;amp; A &amp;amp; Close&lt;br /&gt;
&lt;br /&gt;
'''Registration''' &lt;br /&gt;
&lt;br /&gt;
To register for this free event, please register online at&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-cambridge-spring-chapter-meeting-tuesday-17th-april-2018-tickets-44728540268&lt;br /&gt;
&lt;br /&gt;
The event will be held in the Lord Ashcroft Building, Room LAB002 (Breakout Room LAB006 for networking &amp;amp; refreshments).&lt;br /&gt;
&lt;br /&gt;
Please enter through the Helmore Building and ask at reception.&lt;br /&gt;
&lt;br /&gt;
Anglia Ruskin University&lt;br /&gt;
&lt;br /&gt;
Cambridge Campus&lt;br /&gt;
&lt;br /&gt;
East Road&lt;br /&gt;
&lt;br /&gt;
Cambridge&lt;br /&gt;
&lt;br /&gt;
CB1 1PT&lt;br /&gt;
&lt;br /&gt;
Please note that there is no parking on campus. Get further information on travelling to the university.&lt;br /&gt;
&lt;br /&gt;
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html&lt;br /&gt;
----&lt;br /&gt;
'''Planned dates for upcoming events'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|Cambridge_OWASP  Event 20170927 - Secure Coding Challenge&lt;br /&gt;
|11/09/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP/BCS Cybercrime Forensics &amp;amp; Social Media  Forensics Day Event &lt;br /&gt;
|11/10/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; BCS East Anglia Event - GDPR Evening&lt;br /&gt;
|07/11/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; UK Cyber Security Forum GDPR Event  20171115&lt;br /&gt;
|15/11/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event 20171205&lt;br /&gt;
|05/12/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; BCS Cybercrime Forensics/IoT Forensics  Security Day &lt;br /&gt;
|10/01/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; UK Cyber Security Forum Cyber Machine  Learning Day &lt;br /&gt;
|18/01/2018,&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|13/02/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|13/03/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event&lt;br /&gt;
|17/04/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|08/05/2018&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=244698</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=244698"/>
				<updated>2018-10-29T01:42:00Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: newer version was broken&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- first t&lt;br /&gt;
= Local News =&lt;br /&gt;
&lt;br /&gt;
== Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster “Capture the Flag Event” 2018 ==&lt;br /&gt;
&lt;br /&gt;
=== Thursday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; May 2018 5:30 – 21:30, Compass House (COM014), Anglia Ruskin University, Cambridge, CB5 8DZ ===&lt;br /&gt;
&lt;br /&gt;
==== Hosted by the Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University, British Computer Society (BCS) Cybercrime Forensics Special Internet Group’s, UK Cyber Security Forum Cambridge Cluster and OWASP (Open Web Application Security Project) Cambridge Chapter. ====&lt;br /&gt;
CTF (Capture The Flag) is a type of computer security competition. Contestants are presented with a set of challenges and puzzles which test their creativity, technical coding (and googling) skills, and problem-solving ability. Challenges usually cover a number of categories and when solved, each yields a “flag” which is submitted to a real-time scoring service. The difficulty levels are from beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CTF tournaments are a great and fun way for software developers to learn a wide array of application security skills in a safe and legal environment.&lt;br /&gt;
&lt;br /&gt;
Top scorers will win prizes kindly donated by cyber security technology vendors.&lt;br /&gt;
&lt;br /&gt;
Most programming languages supported.&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT''': Please bring your '''own LAPTOP''' and a charger for the event.&lt;br /&gt;
&lt;br /&gt;
=== '''Background''' ===&lt;br /&gt;
The British Computer Society (BCS) Cybercrime Forensics Special Interest Group (SIG) promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professionals, lawyers, law enforcement officers, academics and those interested in the use of Cybercrime Forensics and the need to address cybercrime for the benefit of those groups and of the wider public.&lt;br /&gt;
&lt;br /&gt;
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.&lt;br /&gt;
&lt;br /&gt;
The '''Cyber Security and Networking''' ('''CSN''') Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organisations such as OWASP, BCS, ISC2, IISP &amp;amp; the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber attacks and educate its users for a more secure cyberspace and operational business environment. These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and neutralising attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs.&lt;br /&gt;
&lt;br /&gt;
The '''Cambridge Cyber Security Cluster''' is an affiliate '''UK Cyber Security Forum''', a government and industry led partnership which will look at how the region can develop the skills and infrastructure to combat cyber security threats.&lt;br /&gt;
&lt;br /&gt;
=== '''Speaker Biographies''' ===&lt;br /&gt;
&lt;br /&gt;
'''Goher Mohammad - Head of Security Engineering for Leadership Team at Photobox Group Security'''&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
Making his mark as one of the youngest IT leaders in Omnicom Group back in 2004, Goher has a huge passion for IT with a particular drive not just do things well but do things better. Having had to deal with more comprehensive but secure and controlled structures in Citibank and Merrill Corporation to more agile environments within Omnicomgroup and now Photobox Group, the next step for him is how to combine the best of both worlds. A keen diver, traveller keen to explore the world, Goher also loves play retro video games and not so secretly is a complete tech geek. Deep down, his inquisitive nature is always looking to understand the inner workings of everything that’s around and in turn, how can it be made better. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
In an ever changing IT world with increased velocity of evolution, we have several challenges we need to deal with. One of which is how the hell do we keep up with the change. Scaling security workflows is an interesting challenge but need not be complex as you may have the tools you need already at your disposal. The second is how do we individually get noticed by talent finders and recruiters. Crowd sourced based security teams may well be the solution to your problems.&lt;br /&gt;
&lt;br /&gt;
=== '''Provisional Agenda''' ===&lt;br /&gt;
18:00 – 18:45:  Registration, Pizza &amp;amp; Beer (Compass House Foyer/Cafe)&lt;br /&gt;
&lt;br /&gt;
18:45 – 19:00 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Director of Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University, (LAB002)&lt;br /&gt;
&lt;br /&gt;
19:00 – 19:30 Guest Speaker - - Goher Mohammad – Head of Security Engineering, Photobox, “Scaling Security Workflows &amp;amp; How to be Hired for a Crowd Sourcing Security Team”&lt;br /&gt;
&lt;br /&gt;
19:30 – 21:30 Capture the Flag – OWASP Challenges&lt;br /&gt;
&lt;br /&gt;
=== '''Registration''' ===&lt;br /&gt;
'''Participation is Free but the number of seats is strictly limited so reservation is recommended.'''&lt;br /&gt;
&lt;br /&gt;
To register for this free event, please register online at&lt;br /&gt;
&lt;br /&gt;
https://goo.gl/azYnp3&lt;br /&gt;
&lt;br /&gt;
The event will be held in the Compass House Building, Room COM014/COM109 (Café in the foyer for networking &amp;amp; refreshments).&lt;br /&gt;
&lt;br /&gt;
Anglia Ruskin University&lt;br /&gt;
&lt;br /&gt;
Compass House (COM014/109)&lt;br /&gt;
&lt;br /&gt;
104 East Road&lt;br /&gt;
&lt;br /&gt;
Cambridge&lt;br /&gt;
&lt;br /&gt;
Cambridgeshire&lt;br /&gt;
&lt;br /&gt;
CB5 8DZ&lt;br /&gt;
&lt;br /&gt;
Please note that there is no parking on campus. Get further information on travelling to the university.&lt;br /&gt;
&lt;br /&gt;
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html&lt;br /&gt;
&lt;br /&gt;
=='''OWASP Cambridge Spring Chapter Meeting -Tuesday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; April 2018'''==&lt;br /&gt;
&lt;br /&gt;
Tuesday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; April 2018 17:30 – 20:30, Lord Ashcroft Building (LAB002/LAB006), Anglia Ruskin University, Cambridge.&lt;br /&gt;
&lt;br /&gt;
Hosted by the Cyber Security Networking  &amp;amp; Big Data Research Group, Anglia Ruskin University, and OWASP (Open Web Application Security Project) Cambridge Chapter&lt;br /&gt;
&lt;br /&gt;
This evening is part of a series of evening events on raising awareness for local  businesses &amp;amp; organisations on the issues of cyber security and cybercrime, what regulations and legislation do organisations need to be aware to protect themselves and what is considered best practice in these challenging times.&lt;br /&gt;
&lt;br /&gt;
'''Background''' &lt;br /&gt;
&lt;br /&gt;
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.&lt;br /&gt;
&lt;br /&gt;
The '''Cyber Security, Networking &amp;amp; Big Data''' ('''CSNBD''') Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organisations such as OWASP, BCS, ISC2, IISP &amp;amp; the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber attacks and educate its users for a more secure cyberspace and operational business environment.  These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and neutralising attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Biographies &amp;amp; Abstracts'''&lt;br /&gt;
&lt;br /&gt;
==== Guest Speaker: Jonathon Brookfield –Security Research Group Director, Blackberry ====&lt;br /&gt;
'''Bio:''' &lt;br /&gt;
&lt;br /&gt;
Jonathon Brookfield leads the Security Research Group at BlackBerry. He has been working in product security for over 12 years, with the last 6 years at BlackBerry. At BlackBerry he has been involved in improving the security of a range of products including BlackBerry OS, BlackBerry 10 and most recently the PRIV on the device side and BlackBerry ID and Enterprise Identity by BlackBerry on the services side.&lt;br /&gt;
&lt;br /&gt;
==== Abstract: ''“Security OAuth 2.0”'' ====&lt;br /&gt;
Enterprise authentication and single sign-on is a frequently overlooked subject by developers and security testers and is often relegated to something that &amp;quot;just works&amp;quot; or stands in the way of accessing the application being assessed. As such, the finer details are frequently ignored or left to third-party libraries to implement. This talk aims to help penetration testers and developers understand OAuth 2.0 protocol, detailing its components, configurations and modes of operation. Common implementation pitfalls will be explored from first-hand experience of securing OAuth in the enterprise, and an example will be demonstrated of how a mistake in the implementation can lead to a compromise of applications relying on OAuth for authorisation.&lt;br /&gt;
&lt;br /&gt;
'''Guest Speaker: Marc Wickenden, CEO, 4Armed.'''&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Marc cut his teeth looking after applications and infrastructure for various online financial services companies before venturing into consultancy and ultimately founding 4ARMED, a company focused on appsec and cloud computing. He part Dev, part Sec, part Ops (the cool kids call this DevSecOps I think) and his latest squeeze is all things Docker and Kubernetes.&lt;br /&gt;
&lt;br /&gt;
'''Abstract: ''“XXE - The Bug That Bit Me”'''''&lt;br /&gt;
&lt;br /&gt;
XXE and me have history. It taught me a valuable lesson and we’ve been friends ever since. It’s prolific yet still relatively unknown outside security testing circles.&lt;br /&gt;
&lt;br /&gt;
It was a new addition to the OWASP Top Ten in 2017 and is unique compared to the other entries. In this talk I’ll explain why, provide live demonstrations of how to find and exploit it based on real world examples I’ve found, show what it’s impact can be and ultimately give you some tips to avoid it.&lt;br /&gt;
&lt;br /&gt;
'''Provisional Agenda'''  &lt;br /&gt;
&lt;br /&gt;
17:30  – 18:15 Registration &amp;amp; Refreshments (LAB006)&lt;br /&gt;
&lt;br /&gt;
18:15 – 18:30 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Director of Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University – Overview of OWASP AppSec 2018 – London July 2&amp;lt;sup&amp;gt;nd&amp;lt;/sup&amp;gt; – 6&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; &amp;amp; OWASP Open Security Summit 4&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; – 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; June 2018.&lt;br /&gt;
&lt;br /&gt;
==== 18:30 – 19:15 “''Security OAuth 2.0''&amp;quot; - Jonathon Brookfield –Security Research Group Director, Blackberry ====&lt;br /&gt;
&lt;br /&gt;
==== 19:15 – 20:00 “''XXE - The Bug That Bit Me''.”- Marc Wickenden, CEO, 4Armed. ====&lt;br /&gt;
20:00 – 20:15 Q &amp;amp; A &amp;amp; Close&lt;br /&gt;
&lt;br /&gt;
'''Registration''' &lt;br /&gt;
&lt;br /&gt;
To register for this free event, please register online at&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-cambridge-spring-chapter-meeting-tuesday-17th-april-2018-tickets-44728540268&lt;br /&gt;
&lt;br /&gt;
The event will be held in the Lord Ashcroft Building, Room LAB002 (Breakout Room LAB006 for networking &amp;amp; refreshments).&lt;br /&gt;
&lt;br /&gt;
Please enter through the Helmore Building and ask at reception.&lt;br /&gt;
&lt;br /&gt;
Anglia Ruskin University&lt;br /&gt;
&lt;br /&gt;
Cambridge Campus&lt;br /&gt;
&lt;br /&gt;
East Road&lt;br /&gt;
&lt;br /&gt;
Cambridge&lt;br /&gt;
&lt;br /&gt;
CB1 1PT&lt;br /&gt;
&lt;br /&gt;
Please note that there is no parking on campus. Get further information on travelling to the university.&lt;br /&gt;
&lt;br /&gt;
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html&lt;br /&gt;
----&lt;br /&gt;
'''Planned dates for upcoming events'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|Cambridge_OWASP  Event 20170927 - Secure Coding Challenge&lt;br /&gt;
|11/09/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP/BCS Cybercrime Forensics &amp;amp; Social Media  Forensics Day Event &lt;br /&gt;
|11/10/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; BCS East Anglia Event - GDPR Evening&lt;br /&gt;
|07/11/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; UK Cyber Security Forum GDPR Event  20171115&lt;br /&gt;
|15/11/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event 20171205&lt;br /&gt;
|05/12/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; BCS Cybercrime Forensics/IoT Forensics  Security Day &lt;br /&gt;
|10/01/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; UK Cyber Security Forum Cyber Machine  Learning Day &lt;br /&gt;
|18/01/2018,&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|13/02/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|13/03/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event&lt;br /&gt;
|17/04/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|08/05/2018&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=244374</id>
		<title>Cambridge</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Cambridge&amp;diff=244374"/>
				<updated>2018-10-19T06:58:44Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: updates&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Cambridge|extra=The chapter leaders are [mailto:Adrian.Winckles@owasp.org Adrian Winckles ]  and [mailto:Steven.van.der.Baan@owasp.org Steven van der Baan].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Cambridge|emailarchives=http://lists.owasp.org/pipermail/owasp-Cambridge}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- first t&lt;br /&gt;
= Local News =&lt;br /&gt;
&lt;br /&gt;
=== Planning for 2018/2019 Events ===&lt;br /&gt;
&lt;br /&gt;
''We're proposing a number events over the next 8-9 months'' &lt;br /&gt;
&lt;br /&gt;
''October Tuesday 23rd October (possibly if I can find speakers)''&lt;br /&gt;
&lt;br /&gt;
''November Tuesday 6th November 5pm - 9pm''&lt;br /&gt;
&lt;br /&gt;
''December Tuesday 4th December 5pm - 9pm'' &lt;br /&gt;
&lt;br /&gt;
''In January I'm looking at potentially a couple of day events (potentially 15th and 24th January 2019)''&lt;br /&gt;
&lt;br /&gt;
''OWASP &amp;amp; BCS Cybercrime Forensics Reverse Engineering Workshop'' &lt;br /&gt;
&lt;br /&gt;
''OWASP , BCS Cybercrime Forensics UK Cyber Security Forum Cyber Threat Intelligence Day''&lt;br /&gt;
&lt;br /&gt;
''In the new year chapter events are likely to be on'' &lt;br /&gt;
&lt;br /&gt;
''Mid February - Tuesday 12th February 5pm - 9pm''&lt;br /&gt;
&lt;br /&gt;
''Mid  March - Tuesday 12th March 5pm - 9pm''&lt;br /&gt;
&lt;br /&gt;
''Early April - Tuesday 9th April 5pm - 9pm''&lt;br /&gt;
&lt;br /&gt;
''Mid May - Tuesday 14th May 5pm - 9pm'' &lt;br /&gt;
&lt;br /&gt;
''Some background on what we’re planning over the next year''&lt;br /&gt;
&lt;br /&gt;
''I’ve had a OWASP Cambridge Meetup created where we’ll post event details (As well as the Wiki and Eventbrite) which will probably eventually replace the mailing list.'' &lt;br /&gt;
&lt;br /&gt;
''&amp;lt;nowiki&amp;gt;https://www.meetup.com/OWASP-Cambridge-Meetup/&amp;lt;/nowiki&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
''We’re always looking for potential speakers, beer and pizza sponsors for future  event so if you can help with any of those please get in touch or if you want to support one of the initiate yes below.'' &lt;br /&gt;
&lt;br /&gt;
''Some themes/ideas we would like to pursue'' &lt;br /&gt;
&lt;br /&gt;
''•             Cambridge Developer and Testing Community - Secure Coding Workshops &amp;amp; Secure Coding Competitions''&lt;br /&gt;
&lt;br /&gt;
''•             OWASP Application Security Verification System (ASVS) Training''&lt;br /&gt;
&lt;br /&gt;
''•             OWASP Threat Modelling Training''&lt;br /&gt;
&lt;br /&gt;
''•             ModSecurity (WAF) Core Rule Set''&lt;br /&gt;
&lt;br /&gt;
''•             Use of Machine Learning in Threat Intelligence''&lt;br /&gt;
&lt;br /&gt;
''•             Capture the Flag Competitions'' &lt;br /&gt;
&lt;br /&gt;
''On a different note , we’re now  leading a couple of OWASP projects via the chapter &amp;amp; day job'' &lt;br /&gt;
&lt;br /&gt;
''OWASP Application Security Curriculum Project'' &lt;br /&gt;
&lt;br /&gt;
''[[OWASP Application Security Curriculum|https://www.owasp.org/index.php/OWASP_Application_Security_Curriculum]]'' &lt;br /&gt;
&lt;br /&gt;
''OWASP Web Honeypot Project''  &lt;br /&gt;
&lt;br /&gt;
''[[OWASP Honeypot Project|https://www.owasp.org/index.php/OWASP_Honeypot_Project]]'' &lt;br /&gt;
&lt;br /&gt;
''IF you know anyone who would like to volunteer to get involved, provide resources or even sponsor please get in contact.  I’d like to use this opportunity to provide opportunities for students to engage in open source industry projects either as internship/placement opportunities or part of dissertation projects   IF anyone ever has has any suitable industry level projects for students to work on as internships, placements or just volunteering opportunities please let me know.''&lt;br /&gt;
&lt;br /&gt;
Look forward to hearing from you&lt;br /&gt;
&lt;br /&gt;
Thanks &lt;br /&gt;
&lt;br /&gt;
Adrian&lt;br /&gt;
&lt;br /&gt;
== Joint OWASP Cambridge, BCS Cybercrime Forensics SIG UK Cyber Security Forum – Cambridge Cluster “Capture the Flag Event” 2018 ==&lt;br /&gt;
&lt;br /&gt;
=== Thursday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; May 2018 5:30 – 21:30, Compass House (COM014), Anglia Ruskin University, Cambridge, CB5 8DZ ===&lt;br /&gt;
&lt;br /&gt;
==== Hosted by the Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University, British Computer Society (BCS) Cybercrime Forensics Special Internet Group’s, UK Cyber Security Forum Cambridge Cluster and OWASP (Open Web Application Security Project) Cambridge Chapter. ====&lt;br /&gt;
CTF (Capture The Flag) is a type of computer security competition. Contestants are presented with a set of challenges and puzzles which test their creativity, technical coding (and googling) skills, and problem-solving ability. Challenges usually cover a number of categories and when solved, each yields a “flag” which is submitted to a real-time scoring service. The difficulty levels are from beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CTF tournaments are a great and fun way for software developers to learn a wide array of application security skills in a safe and legal environment.&lt;br /&gt;
&lt;br /&gt;
Top scorers will win prizes kindly donated by cyber security technology vendors.&lt;br /&gt;
&lt;br /&gt;
Most programming languages supported.&lt;br /&gt;
&lt;br /&gt;
'''IMPORTANT''': Please bring your '''own LAPTOP''' and a charger for the event.&lt;br /&gt;
&lt;br /&gt;
=== '''Background''' ===&lt;br /&gt;
The British Computer Society (BCS) Cybercrime Forensics Special Interest Group (SIG) promotes Cybercrime Forensics and the use of Cybercrime Forensics; of relevance to computing professionals, lawyers, law enforcement officers, academics and those interested in the use of Cybercrime Forensics and the need to address cybercrime for the benefit of those groups and of the wider public.&lt;br /&gt;
&lt;br /&gt;
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.&lt;br /&gt;
&lt;br /&gt;
The '''Cyber Security and Networking''' ('''CSN''') Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organisations such as OWASP, BCS, ISC2, IISP &amp;amp; the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber attacks and educate its users for a more secure cyberspace and operational business environment. These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and neutralising attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs.&lt;br /&gt;
&lt;br /&gt;
The '''Cambridge Cyber Security Cluster''' is an affiliate '''UK Cyber Security Forum''', a government and industry led partnership which will look at how the region can develop the skills and infrastructure to combat cyber security threats.&lt;br /&gt;
&lt;br /&gt;
=== '''Speaker Biographies''' ===&lt;br /&gt;
&lt;br /&gt;
'''Goher Mohammad - Head of Security Engineering for Leadership Team at Photobox Group Security'''&lt;br /&gt;
&lt;br /&gt;
'''Bio'''&lt;br /&gt;
&lt;br /&gt;
Making his mark as one of the youngest IT leaders in Omnicom Group back in 2004, Goher has a huge passion for IT with a particular drive not just do things well but do things better. Having had to deal with more comprehensive but secure and controlled structures in Citibank and Merrill Corporation to more agile environments within Omnicomgroup and now Photobox Group, the next step for him is how to combine the best of both worlds. A keen diver, traveller keen to explore the world, Goher also loves play retro video games and not so secretly is a complete tech geek. Deep down, his inquisitive nature is always looking to understand the inner workings of everything that’s around and in turn, how can it be made better. &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
In an ever changing IT world with increased velocity of evolution, we have several challenges we need to deal with. One of which is how the hell do we keep up with the change. Scaling security workflows is an interesting challenge but need not be complex as you may have the tools you need already at your disposal. The second is how do we individually get noticed by talent finders and recruiters. Crowd sourced based security teams may well be the solution to your problems.&lt;br /&gt;
&lt;br /&gt;
=== '''Provisional Agenda''' ===&lt;br /&gt;
18:00 – 18:45:  Registration, Pizza &amp;amp; Beer (Compass House Foyer/Cafe)&lt;br /&gt;
&lt;br /&gt;
18:45 – 19:00 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Director of Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University, (LAB002)&lt;br /&gt;
&lt;br /&gt;
19:00 – 19:30 Guest Speaker - - Goher Mohammad – Head of Security Engineering, Photobox, “Scaling Security Workflows &amp;amp; How to be Hired for a Crowd Sourcing Security Team”&lt;br /&gt;
&lt;br /&gt;
19:30 – 21:30 Capture the Flag – OWASP Challenges&lt;br /&gt;
&lt;br /&gt;
=== '''Registration''' ===&lt;br /&gt;
'''Participation is Free but the number of seats is strictly limited so reservation is recommended.'''&lt;br /&gt;
&lt;br /&gt;
To register for this free event, please register online at&lt;br /&gt;
&lt;br /&gt;
https://goo.gl/azYnp3&lt;br /&gt;
&lt;br /&gt;
The event will be held in the Compass House Building, Room COM014/COM109 (Café in the foyer for networking &amp;amp; refreshments).&lt;br /&gt;
&lt;br /&gt;
Anglia Ruskin University&lt;br /&gt;
&lt;br /&gt;
Compass House (COM014/109)&lt;br /&gt;
&lt;br /&gt;
104 East Road&lt;br /&gt;
&lt;br /&gt;
Cambridge&lt;br /&gt;
&lt;br /&gt;
Cambridgeshire&lt;br /&gt;
&lt;br /&gt;
CB5 8DZ&lt;br /&gt;
&lt;br /&gt;
Please note that there is no parking on campus. Get further information on travelling to the university.&lt;br /&gt;
&lt;br /&gt;
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html&lt;br /&gt;
&lt;br /&gt;
=='''OWASP Cambridge Spring Chapter Meeting -Tuesday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; April 2018'''==&lt;br /&gt;
&lt;br /&gt;
Tuesday 17&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; April 2018 17:30 – 20:30, Lord Ashcroft Building (LAB002/LAB006), Anglia Ruskin University, Cambridge.&lt;br /&gt;
&lt;br /&gt;
Hosted by the Cyber Security Networking  &amp;amp; Big Data Research Group, Anglia Ruskin University, and OWASP (Open Web Application Security Project) Cambridge Chapter&lt;br /&gt;
&lt;br /&gt;
This evening is part of a series of evening events on raising awareness for local  businesses &amp;amp; organisations on the issues of cyber security and cybercrime, what regulations and legislation do organisations need to be aware to protect themselves and what is considered best practice in these challenging times.&lt;br /&gt;
&lt;br /&gt;
'''Background''' &lt;br /&gt;
&lt;br /&gt;
OWASP (Open Web Application Security Project is a 501(c)(3) not-for-profit worldwide charitable organization focused on improving the security of application software. Their mission is to make application security visible, so that people and organizations can make informed decisions about true application security risks.&lt;br /&gt;
&lt;br /&gt;
The '''Cyber Security, Networking &amp;amp; Big Data''' ('''CSNBD''') Research Group at Anglia Ruskin University has close working strategic relationships with industry, professional bodies, law enforcement, government agencies and academia in the delivery of operationally focused applied information and application security research.  We have strong international links with professional organisations such as OWASP, BCS, ISC2, IISP &amp;amp; the UK Cyber Security Forum amongst others.  The primary aims of CSNRG are to help the UK and partner nations to tackle cybercrime, be more resilient to cyber attacks and educate its users for a more secure cyberspace and operational business environment.  These will be achieved through the investigation of threats posed to information systems and understanding the impact of attacks and creation of cyber-based warning systems which gathering threat intelligence, automate threat detection, alert users and neutralising attacks.  For network security we are researching securing the next generation of software defined infrastructures from the application API and control/data plane attacks. Other key work includes Computer forensic analysis, digital evidence crime scenes and evidence visualisation as well as Cyber educational approaches such as developing Capture the Flag (CTF) resources and application security programs. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Biographies &amp;amp; Abstracts'''&lt;br /&gt;
&lt;br /&gt;
==== Guest Speaker: Jonathon Brookfield –Security Research Group Director, Blackberry ====&lt;br /&gt;
'''Bio:''' &lt;br /&gt;
&lt;br /&gt;
Jonathon Brookfield leads the Security Research Group at BlackBerry. He has been working in product security for over 12 years, with the last 6 years at BlackBerry. At BlackBerry he has been involved in improving the security of a range of products including BlackBerry OS, BlackBerry 10 and most recently the PRIV on the device side and BlackBerry ID and Enterprise Identity by BlackBerry on the services side.&lt;br /&gt;
&lt;br /&gt;
==== Abstract: ''“Security OAuth 2.0”'' ====&lt;br /&gt;
Enterprise authentication and single sign-on is a frequently overlooked subject by developers and security testers and is often relegated to something that &amp;quot;just works&amp;quot; or stands in the way of accessing the application being assessed. As such, the finer details are frequently ignored or left to third-party libraries to implement. This talk aims to help penetration testers and developers understand OAuth 2.0 protocol, detailing its components, configurations and modes of operation. Common implementation pitfalls will be explored from first-hand experience of securing OAuth in the enterprise, and an example will be demonstrated of how a mistake in the implementation can lead to a compromise of applications relying on OAuth for authorisation.&lt;br /&gt;
&lt;br /&gt;
'''Guest Speaker: Marc Wickenden, CEO, 4Armed.'''&lt;br /&gt;
&lt;br /&gt;
'''Bio:'''&lt;br /&gt;
&lt;br /&gt;
Marc cut his teeth looking after applications and infrastructure for various online financial services companies before venturing into consultancy and ultimately founding 4ARMED, a company focused on appsec and cloud computing. He part Dev, part Sec, part Ops (the cool kids call this DevSecOps I think) and his latest squeeze is all things Docker and Kubernetes.&lt;br /&gt;
&lt;br /&gt;
'''Abstract: ''“XXE - The Bug That Bit Me”'''''&lt;br /&gt;
&lt;br /&gt;
XXE and me have history. It taught me a valuable lesson and we’ve been friends ever since. It’s prolific yet still relatively unknown outside security testing circles.&lt;br /&gt;
&lt;br /&gt;
It was a new addition to the OWASP Top Ten in 2017 and is unique compared to the other entries. In this talk I’ll explain why, provide live demonstrations of how to find and exploit it based on real world examples I’ve found, show what it’s impact can be and ultimately give you some tips to avoid it.&lt;br /&gt;
&lt;br /&gt;
'''Provisional Agenda'''  &lt;br /&gt;
&lt;br /&gt;
17:30  – 18:15 Registration &amp;amp; Refreshments (LAB006)&lt;br /&gt;
&lt;br /&gt;
18:15 – 18:30 Welcome from the OWASP Cambridge Chapter Leader, Adrian Winckles, Director of Cyber Security &amp;amp; Networking Research Group, Anglia Ruskin University – Overview of OWASP AppSec 2018 – London July 2&amp;lt;sup&amp;gt;nd&amp;lt;/sup&amp;gt; – 6&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; &amp;amp; OWASP Open Security Summit 4&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; – 8&amp;lt;sup&amp;gt;th&amp;lt;/sup&amp;gt; June 2018.&lt;br /&gt;
&lt;br /&gt;
==== 18:30 – 19:15 “''Security OAuth 2.0''&amp;quot; - Jonathon Brookfield –Security Research Group Director, Blackberry ====&lt;br /&gt;
&lt;br /&gt;
==== 19:15 – 20:00 “''XXE - The Bug That Bit Me''.”- Marc Wickenden, CEO, 4Armed. ====&lt;br /&gt;
20:00 – 20:15 Q &amp;amp; A &amp;amp; Close&lt;br /&gt;
&lt;br /&gt;
'''Registration''' &lt;br /&gt;
&lt;br /&gt;
To register for this free event, please register online at&lt;br /&gt;
&lt;br /&gt;
https://www.eventbrite.com/e/owasp-cambridge-spring-chapter-meeting-tuesday-17th-april-2018-tickets-44728540268&lt;br /&gt;
&lt;br /&gt;
The event will be held in the Lord Ashcroft Building, Room LAB002 (Breakout Room LAB006 for networking &amp;amp; refreshments).&lt;br /&gt;
&lt;br /&gt;
Please enter through the Helmore Building and ask at reception.&lt;br /&gt;
&lt;br /&gt;
Anglia Ruskin University&lt;br /&gt;
&lt;br /&gt;
Cambridge Campus&lt;br /&gt;
&lt;br /&gt;
East Road&lt;br /&gt;
&lt;br /&gt;
Cambridge&lt;br /&gt;
&lt;br /&gt;
CB1 1PT&lt;br /&gt;
&lt;br /&gt;
Please note that there is no parking on campus. Get further information on travelling to the university.&lt;br /&gt;
&lt;br /&gt;
http://www.anglia.ac.uk/ruskin/en/home/your_university/anglia_ruskin_campuses/cambridge_campus/find_cambridge.html&lt;br /&gt;
----&lt;br /&gt;
'''Planned dates for upcoming events'''&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|Cambridge_OWASP  Event 20170927 - Secure Coding Challenge&lt;br /&gt;
|11/09/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP/BCS Cybercrime Forensics &amp;amp; Social Media  Forensics Day Event &lt;br /&gt;
|11/10/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; BCS East Anglia Event - GDPR Evening&lt;br /&gt;
|07/11/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; UK Cyber Security Forum GDPR Event  20171115&lt;br /&gt;
|15/11/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event 20171205&lt;br /&gt;
|05/12/2017&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; BCS Cybercrime Forensics/IoT Forensics  Security Day &lt;br /&gt;
|10/01/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP &amp;amp; UK Cyber Security Forum Cyber Machine  Learning Day &lt;br /&gt;
|18/01/2018,&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|13/02/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|13/03/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event&lt;br /&gt;
|17/04/2018&lt;br /&gt;
|-&lt;br /&gt;
|Cambridge_OWASP Event &lt;br /&gt;
|08/05/2018&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Past Events =&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align:center;&amp;quot; border=&amp;quot;1&amp;quot; |&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Date&lt;br /&gt;
! width=&amp;quot;350&amp;quot; | Name / Title&lt;br /&gt;
! width=&amp;quot;300&amp;quot; | Link&lt;br /&gt;
|-&lt;br /&gt;
|17 May 2018&lt;br /&gt;
|Goher Mohammad&lt;br /&gt;
|[https://www.slideshare.net/GoherMohammad/joint-owasp-cambridge-bcs-cybercrime-forensics-sig-uk-cyber-security-forum-cambridge-cluster Presentation]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|David Johannson&lt;br /&gt;
|[[Media:Cambridge 13-Mar-2018 OWASP Top 10 2017.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|13 March 2018&lt;br /&gt;
|Rish Auckburally&lt;br /&gt;
|[[Media:Intro to 3B RA V1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|[[Media:OWASP-AI-Cybersecurity Cambridge-Deep-180118.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Chris Woods&lt;br /&gt;
|[[Media:Deck OWASP event 17-01.pptx|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Nikola Milosevic &lt;br /&gt;
|[[Media:OWASPCambridge.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|18 January 2018&lt;br /&gt;
|Dr Ali Dehghantanha&lt;br /&gt;
|[[Media:OWASP Cambridge Myths and Truths Cyber Threat Hunting and Intelligence in IoT Environments.pptx|presentation]] ‎&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|10 January 2018&lt;br /&gt;
|Aleksander Gorkowienko&lt;br /&gt;
|[[Media:A.Gorkowienko-Securing Oil and Gas Systems From Cyber-attack v1.1.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Deepinder Singh&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|5 December 2017&lt;br /&gt;
|Leum Dunn&lt;br /&gt;
|[[Media:100 things.pdf|presentation]]&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|7 November 2017&lt;br /&gt;
|Dr Reza Alavi&lt;br /&gt;
|[[Media:GDPR.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dr Char Sample&lt;br /&gt;
|[[Media:FN-20171011_(compressed_image_version.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|11 October 2017&lt;br /&gt;
|Dennis Ivory &amp;amp; Dr Diane Gan&lt;br /&gt;
|[[Media:Anglia Ruskin F435.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
|12 September 2017&lt;br /&gt;
|John Fitzgerald - Secure Code Warrior&lt;br /&gt;
|presentation&lt;br /&gt;
|-&lt;br /&gt;
| 4 April 2017&lt;br /&gt;
| Leum Dunn - Redacted&lt;br /&gt;
| [[Media:A day in the life of.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| Andrew Thompson - Checkmarx&lt;br /&gt;
| [[Media:OWASP Cambridge - Checkmarx Software AppSec kit.pdf|presentation]]&lt;br /&gt;
|--&lt;br /&gt;
| 7 March 2017&lt;br /&gt;
| John Haine IoT Security Foundation (Chair)&lt;br /&gt;
| [[Media:Ambassador IoTSF Feb 2017 Intro jlh.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Nick Alston CBE / PIER Chair&lt;br /&gt;
| [[Media:Cyber session.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Mark Pearce/ 7Safe/PA Consulting&lt;br /&gt;
| [[Media:PA GDPR 25 JANUARY 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:2017-01-25,GDPR Readiness-Handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Paul Rowley FBCS / Havebury Housing Association&lt;br /&gt;
| [[Media:OWASP event 250117 Paul Rowley pres.pptx|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Laurence Kaleman / Legal Director, Olswang &lt;br /&gt;
| [[Media:Olswang slides - GDPR and NIS Directive - accountability security and trust - 25 Jan 2017.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 25 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITGGDPRNIS20170125v0.1.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Tony Drewitt / Head of Consultancy - IT Governance&lt;br /&gt;
| [[Media:ITG IncidentResponse 20170119.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Peter Yapp / NCSC Deputy Director - Incident Response&lt;br /&gt;
| [[Media:NCSC slides.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 19 Jan 2017&lt;br /&gt;
| Martin Cassey / Nascenta&lt;br /&gt;
| [[Media:Nascenta-IM-handout.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Graham Rymer /  University of Cambridge &lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Nov 2016&lt;br /&gt;
| Mark Wickenden&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Phil Cobley / Modern Policing &amp;amp; the Fight Against Cyber Crime&lt;br /&gt;
| [[Media:Cyber Threat Presentation - ARU Cyber Resilience - May 2016.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 12 05 2016&lt;br /&gt;
| Jules Pagna Disso / Building a resilient ICS &lt;br /&gt;
| [[MEdia:Building a resilient ICS.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 08 03 2016&lt;br /&gt;
|  Andrew Lee-Thorp / So you want to use a WebView? Android WebView: Attack and Defence&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 11 2015&lt;br /&gt;
| Steve Lord / Trying (and failing) to secure the Internet of Things&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| John Mersh / Software and System Security: a life vest in the IoT ocean&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Oct 2015&lt;br /&gt;
| Sumit &amp;quot;sid&amp;quot; Siddharth / Some neat, new and ridiculous hacks from our vault&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 10 Feb 2015&lt;br /&gt;
| Steven van der Baan / Web Application Security Testing with Burp Suite&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|  2 December 2014&lt;br /&gt;
| Colin Watson / OWASP Cornucopia&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 21 October 2014&lt;br /&gt;
| Eireann Leverett&lt;br /&gt;
| [[Media:20141021-Eireann Leverett-SwitchesGetStitches.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 1st April 2014&lt;br /&gt;
| Ian Glover (CREST) / Overview of the CREST activities to professionalise the industry.&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
|  Yiannis Chrysanthou (KPMG) / Modern Password Cracking&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
|&lt;br /&gt;
| Damien King (KPMG) / Filename Enumeration with TildeTool&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| Paul Cain / Tracking Data using Forensics&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| 12th November 2013&lt;br /&gt;
| James Forshaw/ The Forger's Art: Exploiting XML Digital Signature Implementations&lt;br /&gt;
| [[Media:20131112-James Forshaw-the forgers art-james forshaw-breakpoint2k13.pdf|presentation]]&lt;br /&gt;
|- &lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Sarantis Makoudis / Android (in)Security&lt;br /&gt;
| [[Media:20130305-sarantis.pdf|presentation]]&lt;br /&gt;
|-&lt;br /&gt;
| 5th March 2013&lt;br /&gt;
| Nikhil Sreekumar / Power On, Powershell&lt;br /&gt;
| [http://www.slideshare.net/Roo7break/power-on-powershell presentation]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;!-- Don't remove this tag --&amp;gt;&lt;br /&gt;
__NOTOC__ &lt;br /&gt;
&amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Curriculum&amp;diff=243098</id>
		<title>OWASP Application Security Curriculum</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Curriculum&amp;diff=243098"/>
				<updated>2018-09-02T09:45:58Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: Minor edits&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Part of OWASP’s main purpose is to “Be the thriving global community that drives visibility and evolution in the safety and security of the world’s software”. A key part of that mission is to educate not just the current generation of developers or information security professionals, but also the next generation, particularly in the context of the acknowledged skills shortage in the security sector.&lt;br /&gt;
&lt;br /&gt;
A common problem with many security education programmes (whether cyber or InfoSec) or even traditional computer science programmes is that they do not address application security adequately, if at all. In some regions, attempts have been made to address this deficit.&lt;br /&gt;
&lt;br /&gt;
In the UK for example, ISC2 and the BCS are working on an initiative to embed security firmly within the Computer Science curriculum, with an emphasis on secure coding techniques. OWASP, through my involvement, also champions this initiative.&lt;br /&gt;
&lt;br /&gt;
There is an opportunity for OWASP to pull together its wide-ranging expertise, projects, and dedicated volunteers to engage in these types of education programmes and initiatives by developing an educational strategy for undergraduate and postgraduate students. This could take the form of an open “Standard” curriculum template which can be adopted and adapted by diverse educational partners and organisations. Such a template would also give a useful starting point or reference document for when we engage with other professional bodies.	&lt;br /&gt;
&lt;br /&gt;
=== Aims &amp;amp; Objectives ===&lt;br /&gt;
  &lt;br /&gt;
 * What aspects of Application Security knowledge and skills does industry need?&lt;br /&gt;
 * What problems relating to application security does the next generation of graduate software developers, computer scientists and security analysts need to solve?&lt;br /&gt;
 * Establish a core set of learning objectives for BSC/MSc level Application Security curricula&lt;br /&gt;
 * Establish which OWASP Projects are useful to help shape and support curricula in Application Security&lt;br /&gt;
 * Determine a mechanism by which regional/local deliveries of the curriculum could be supported by the OWASP community (for example, OWASP supporters on validation panels, critical friend on module design, guest lectures and training academics).&lt;br /&gt;
 &lt;br /&gt;
===Project Outputs &amp;amp; Roadmap===&lt;br /&gt;
&lt;br /&gt;
* Produce a wider survey of OWASP trainers and educational supporters to canvas opinions on a wider range of generic Application Security Skills and knowledge which would be required from a  curriculum and determining suitable learning objectives to be able to produce an “open” curriculum for any educational institution or trainer to use. &lt;br /&gt;
&lt;br /&gt;
* A second and larger part of the work is then to map the knowledge, skills &amp;amp; learning objectives to OWASP Project materials to help deliver quality educational experiences to those study Application Security &lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Installation Package]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves What's New (Revision History)]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Wiki Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Adrian Winckles&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Curriculum&amp;diff=243097</id>
		<title>OWASP Application Security Curriculum</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Curriculum&amp;diff=243097"/>
				<updated>2018-09-02T09:45:04Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: Chnged to black&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Part of OWASP’s main purpose is to “Be the thriving global community that drives visibility and evolution in the safety and security of the world’s software”. A key part of that mission is to educate not just the current generation of developers or information security professionals, but also the next generation, particularly in the context of the acknowledged skills shortage in the security sector.&lt;br /&gt;
&lt;br /&gt;
A common problem with many security education programmes (whether cyber or InfoSec) or even traditional computer science programmes is that they do not address application security adequately, if at all. In some regions, attempts have been made to address this deficit.&lt;br /&gt;
&lt;br /&gt;
In the UK for example, ISC2 and the BCS are working on an initiative to embed security firmly within the Computer Science curriculum, with an emphasis on secure coding techniques. OWASP, through my involvement, also champions this initiative.&lt;br /&gt;
&lt;br /&gt;
There is an opportunity for OWASP to pull together its wide-ranging expertise, projects, and dedicated volunteers to engage in these types of education programmes and initiatives by developing an educational strategy for undergraduate and postgraduate students. This could take the form of an open “Standard” curriculum template which can be adopted and adapted by diverse educational partners and organisations. Such a template would also give a useful starting point or reference document for when we engage with other professional bodies.	&lt;br /&gt;
&lt;br /&gt;
=== Aims &amp;amp; Objectives ===&lt;br /&gt;
  &lt;br /&gt;
 * What aspects of Application Security knowledge and skills does industry need?&lt;br /&gt;
 * What problems relating to application security does the next generation of graduate software developers, computer scientists and security analysts need to solve?&lt;br /&gt;
 * Establish a core set of learning objectives for BSC/MSc level Application Security curricula&lt;br /&gt;
 * Establish which OWASP Projects are useful to help shape and support curricula in Application Security&lt;br /&gt;
 * Determine a mechanism by which regional/local deliveries of the curriculum could be supported by the OWASP community (for example, OWASP supporters on validation panels, critical friend on module design, guest lectures and training academics).&lt;br /&gt;
 &lt;br /&gt;
===Project Outputs &amp;amp; Roadmap===&lt;br /&gt;
&lt;br /&gt;
* Produce a wider survey of OWASP trainers and educational supporters to canvas opinions on a wider range of generic Application Security Skills and knowledge which would be required from a  curriculum and determining suitable learning objectives to be able to produce an “open” curriculum for any educational institution or trainer to use. &lt;br /&gt;
&lt;br /&gt;
* A second and larger part of the work is then to map the knowledge, skills &amp;amp; learning objectives to OWASP Project materials to help deliver quality educational experiences to those study Application Security &lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Installation Package]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves What's New (Revision History)]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Wiki Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Adrian Winckles&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Tool_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Curriculum&amp;diff=243096</id>
		<title>OWASP Application Security Curriculum</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Curriculum&amp;diff=243096"/>
				<updated>2018-09-02T09:42:04Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: Added DEscription&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
==Description==&lt;br /&gt;
&lt;br /&gt;
Part of OWASP’s main purpose is to “Be the thriving global community that drives visibility and evolution in the safety and security of the world’s software”. A key part of that mission is to educate not just the current generation of developers or information security professionals, but also the next generation, particularly in the context of the acknowledged skills shortage in the security sector.&lt;br /&gt;
&lt;br /&gt;
A common problem with many security education programmes (whether cyber or InfoSec) or even traditional computer science programmes is that they do not address application security adequately, if at all. In some regions, attempts have been made to address this deficit.&lt;br /&gt;
&lt;br /&gt;
In the UK for example, ISC2 and the BCS are working on an initiative to embed security firmly within the Computer Science curriculum, with an emphasis on secure coding techniques. OWASP, through my involvement, also champions this initiative.&lt;br /&gt;
&lt;br /&gt;
There is an opportunity for OWASP to pull together its wide-ranging expertise, projects, and dedicated volunteers to engage in these types of education programmes and initiatives by developing an educational strategy for undergraduate and postgraduate students. This could take the form of an open “Standard” curriculum template which can be adopted and adapted by diverse educational partners and organisations. Such a template would also give a useful starting point or reference document for when we engage with other professional bodies.	&lt;br /&gt;
&lt;br /&gt;
=== Aims &amp;amp; Objectives ===&lt;br /&gt;
  &lt;br /&gt;
 * What aspects of Application Security knowledge and skills does industry need?&lt;br /&gt;
 * What problems relating to application security does the next generation of graduate software developers, computer scientists and security analysts need to solve?&lt;br /&gt;
 * Establish a core set of learning objectives for BSC/MSc level Application Security curricula&lt;br /&gt;
 * Establish which OWASP Projects are useful to help shape and support curricula in Application Security&lt;br /&gt;
 * Determine a mechanism by which regional/local deliveries of the curriculum could be supported by the OWASP community (for example, OWASP supporters on validation panels, critical friend on module design, guest lectures and training academics).&lt;br /&gt;
 &lt;br /&gt;
===Project Outputs &amp;amp; Roadmap===&lt;br /&gt;
&lt;br /&gt;
* Produce a wider survey of OWASP trainers and educational supporters to canvas opinions on a wider range of generic Application Security Skills and knowledge which would be required from a  curriculum and determining suitable learning objectives to be able to produce an “open” curriculum for any educational institution or trainer to use. &lt;br /&gt;
&lt;br /&gt;
* A second and larger part of the work is then to map the knowledge, skills &amp;amp; learning objectives to OWASP Project materials to help deliver quality educational experiences to those study Application Security &lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Installation Package]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves What's New (Revision History)]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Wiki Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Adrian Winckles&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Tool_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Curriculum&amp;diff=243094</id>
		<title>OWASP Application Security Curriculum</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Application_Security_Curriculum&amp;diff=243094"/>
				<updated>2018-09-01T20:53:59Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: removed&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
==Description==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you need to add your more robust project description. A project description should outline the purpose of the project, how it is used, and the value it provides to application security. Ideally, project descriptions should be written in such a way that there is no question what value the project provides to the software security community. This section will be seen and used in various places within the Projects Portal. Poorly written project descriptions therefore detract from a project’s visibility, so project leaders should ensure that the description is meaningful.  &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Documentation Project Template is simply a sample project that was developed for instructional purposes that can be used to create default project pages for a Documentation project.  After copying this template to your new project, all you have to do is follow the instructions in red, replace the sample text with text suited for your project, and then delete the sections in red.  Doing so should make it clearer to both consumers of this project, as well as OWASP reviewers who are trying to determine if the project can be promoted to the next category.  The information requested is also intended to help Project Leaders think about the roadmap and feature priorities, and give guidance to the reviews as a result of that effort.&lt;br /&gt;
&lt;br /&gt;
Creating a new set of project pages from scratch can be a challenging task.  By providing a sample layout, with instructional text and examples, the OWASP Documentation Project Template makes it easier for Project Leaders to create effective security projects and hence helps promote security.&lt;br /&gt;
&lt;br /&gt;
Contextual custom dictionary builder with character substitution and word variations for pen-testers&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
A project must be licensed under a community friendly or open source license.  For more information on OWASP recommended licenses, please see [https://www.owasp.org/index.php/OWASP_Licenses OWASP Licenses]. While OWASP does not promote any particular license over another, the vast majority of projects have chosen a Creative Commons license variant for documentation projects, or a GNU General Public License variant for tools and code projects.  This example assumes that you want to use the AGPL 3.0 license.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
This program is free software: you can redistribute it and/or modify it under the terms of the [http://www.gnu.org/licenses/agpl-3.0.html link GNU Affero General Public License 3.0] as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.  OWASP XXX and any contributions are Copyright &amp;amp;copy; by {the Project Leader(s) or OWASP} {Year(s)}.  &lt;br /&gt;
&lt;br /&gt;
==Roadmap==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Documentation Project Template&lt;br /&gt;
* Get other people to review the Documentation Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Documentation Project Template&lt;br /&gt;
* Finalize the Documentation Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Documentation Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to the key locations for project files, including setup programs, the source code repository, online documentation, a Wiki Home Page, threaded discussions about the project, and Issue Tracking system, etc. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Installation Package]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves What's New (Revision History)]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Documentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Wiki Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Issue Tracker]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Slide Presentation]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/SamanthaGroves Video]&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	A project leader is the individual who decides to lead the project throughout its lifecycle. The project leader is responsible for communicating the project’s progress to the OWASP Foundation, and he/she is ultimately responsible for the project’s deliverables. The project leader must provide OWASP with his/her real name and contact e-mail address for his/her project application to be accepted, as OWASP prides itself on the openness of its products, operations, and members.&lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adrian Winckles&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:#ff0000&amp;quot;&amp;gt;&lt;br /&gt;
	This is where you can link to other OWASP Projects that are similar to yours. &lt;br /&gt;
&amp;lt;/span&amp;gt;&lt;br /&gt;
* [[OWASP_Code_Project_Template]]&lt;br /&gt;
* [[OWASP_Tool_Project_Template]]&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_DOC.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Document]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[Image:Creative%20Commons.png| 90px | link=https://creativecommons.org/licenses/by-sa/3.0/| Creative Commons Attribution ShareAlike 3.0 License]]&lt;br /&gt;
   |}&lt;br /&gt;
|}&lt;br /&gt;
 &lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]] &lt;br /&gt;
[[Category:OWASP_Document]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=243093</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=243093"/>
				<updated>2018-09-01T20:37:33Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open_Security_Summit_Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 Conference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2018, the  priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project&lt;br /&gt;
* (https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of the &amp;lt;strong&amp;gt;Web Honeypot Project &amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
* Coding aspects of CRS/JSON&lt;br /&gt;
* Working on Component Integration &lt;br /&gt;
* Deploying a Honeypot/Probe&lt;br /&gt;
* Testing&lt;br /&gt;
&lt;br /&gt;
=Project Participants=&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
* Mark Graham&lt;br /&gt;
* Artur Zaremba (Intern)&lt;br /&gt;
* [https://www.owasp.org/index.php/Special:Contributions/Felipe_Zipitria Felipe Zipitria]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Tin_Zaw Tin Zaw]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ali_Razmjoo Ali Razmjoo]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242844</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242844"/>
				<updated>2018-08-26T22:41:29Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: vg&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open_Security_Summit_Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 Conference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
The OWASP Tool Project Template is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] who created the OWASP Cornucopia project that the template was derived from&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chuck_Cooper Chuck Cooper] who edited the template to convert it from a documentation project to a Tool Project Template&lt;br /&gt;
* '''YOUR NAME BELONGS HERE AND YOU SHOULD REMOVE THE PRIOR 3 NAMES'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2018, the  priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project&lt;br /&gt;
* (https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of the &amp;lt;strong&amp;gt;Web Honeypot Project &amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
* Coding aspects of CRS/JSON&lt;br /&gt;
* Working on Component Integration &lt;br /&gt;
* Deploying a Honeypot/Probe&lt;br /&gt;
* Testing&lt;br /&gt;
&lt;br /&gt;
=Project Participants=&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
* Mark Graham&lt;br /&gt;
* Artur Zaremba (Intern)&lt;br /&gt;
* [https://www.owasp.org/index.php/Special:Contributions/Felipe_Zipitria Felipe Zipitria]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Tin_Zaw Tin Zaw]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ali_Razmjoo Ali Razmjoo]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242843</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242843"/>
				<updated>2018-08-26T22:40:36Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: Contributors&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open_Security_Summit_Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 Conference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
The OWASP Tool Project Template is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] who created the OWASP Cornucopia project that the template was derived from&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chuck_Cooper Chuck Cooper] who edited the template to convert it from a documentation project to a Tool Project Template&lt;br /&gt;
* '''YOUR NAME BELONGS HERE AND YOU SHOULD REMOVE THE PRIOR 3 NAMES'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2018, the  priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project&lt;br /&gt;
* (https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of the &amp;lt;strong&amp;gt;Web Honeypot Project &amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
* Coding aspects of CRS/JSON&lt;br /&gt;
* Working on Component Integration &lt;br /&gt;
* Deploying a Honeypot/Probe&lt;br /&gt;
* Testing&lt;br /&gt;
&lt;br /&gt;
=Project Participants=&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
* Mark Graham&lt;br /&gt;
* Artur Zaremba (Intern)&lt;br /&gt;
* ]https://www.owasp.org/index.php/Special:Contributions/Felipe_Zipitria Felipe Zipitria]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Tin_Zaw Tin Zaw]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders]&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Ali_Razmjoo Ali Razmjoo]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242835</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242835"/>
				<updated>2018-08-26T20:12:07Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: Added project team members&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open_Security_Summit_Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 Conference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
The OWASP Tool Project Template is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] who created the OWASP Cornucopia project that the template was derived from&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chuck_Cooper Chuck Cooper] who edited the template to convert it from a documentation project to a Tool Project Template&lt;br /&gt;
* '''YOUR NAME BELONGS HERE AND YOU SHOULD REMOVE THE PRIOR 3 NAMES'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2018, the  priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project&lt;br /&gt;
* (https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of the &amp;lt;strong&amp;gt;Web Honeypot Project &amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
* Coding aspects of CRS/JSON&lt;br /&gt;
* Working on Component Integration &lt;br /&gt;
* Deploying a Honeypot/Probe&lt;br /&gt;
* Testing&lt;br /&gt;
&lt;br /&gt;
=Project Participants=&lt;br /&gt;
&lt;br /&gt;
* Adrian Winckles&lt;br /&gt;
* Mark Graham&lt;br /&gt;
* Artur Zaremba (Intern)&lt;br /&gt;
* Felipe Zipitria &lt;br /&gt;
* Tin Zaw&lt;br /&gt;
* Chaim Sanders&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242834</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242834"/>
				<updated>2018-08-26T20:10:56Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: Added&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open_Security_Summit_Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 Conference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
The OWASP Tool Project Template is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] who created the OWASP Cornucopia project that the template was derived from&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chuck_Cooper Chuck Cooper] who edited the template to convert it from a documentation project to a Tool Project Template&lt;br /&gt;
* '''YOUR NAME BELONGS HERE AND YOU SHOULD REMOVE THE PRIOR 3 NAMES'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2018, the  priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project&lt;br /&gt;
* (https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of the &amp;lt;strong&amp;gt;Web Honeypot Project &amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
* Coding aspects of CRS/JSON&lt;br /&gt;
* Working on Component Integration &lt;br /&gt;
* Deploying a Honeypot/Probe&lt;br /&gt;
* Testing&lt;br /&gt;
&lt;br /&gt;
=Project Participants=&lt;br /&gt;
&lt;br /&gt;
Adrian Winckles&lt;br /&gt;
Mark Graham&lt;br /&gt;
Artur Zaremba (Intern)&lt;br /&gt;
Felipe Zipitria &lt;br /&gt;
Tin Zaw&lt;br /&gt;
Chaim Sanders&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242833</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242833"/>
				<updated>2018-08-26T20:09:51Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open_Security_Summit_Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 Conference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
The OWASP Tool Project Template is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] who created the OWASP Cornucopia project that the template was derived from&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chuck_Cooper Chuck Cooper] who edited the template to convert it from a documentation project to a Tool Project Template&lt;br /&gt;
* '''YOUR NAME BELONGS HERE AND YOU SHOULD REMOVE THE PRIOR 3 NAMES'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2018, the  priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project&lt;br /&gt;
* (https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of the &amp;lt;strong&amp;gt;Web Honeypot Project &amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
Coding aspects of CRS/JSON&lt;br /&gt;
Working on Component Integration &lt;br /&gt;
Deploying a Honeypot/Probe&lt;br /&gt;
Testing &lt;br /&gt;
&lt;br /&gt;
=Project Participants=&lt;br /&gt;
&lt;br /&gt;
Adrian Winckles&lt;br /&gt;
Mark Graham&lt;br /&gt;
Artur Zaremba (Intern)&lt;br /&gt;
Felipe Zipitria &lt;br /&gt;
Tin Zaw&lt;br /&gt;
Chaim Sanders&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242832</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242832"/>
				<updated>2018-08-26T19:56:59Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: Added roadmap&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open_Security_Summit_Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 Conference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
The OWASP Tool Project Template is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] who created the OWASP Cornucopia project that the template was derived from&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chuck_Cooper Chuck Cooper] who edited the template to convert it from a documentation project to a Tool Project Template&lt;br /&gt;
* '''YOUR NAME BELONGS HERE AND YOU SHOULD REMOVE THE PRIOR 3 NAMES'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;August, 2018, the  priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Setup Proof of Concept to understand how Mod Security baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).&lt;br /&gt;
* Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.&lt;br /&gt;
* Develop a mechanism to convert from stored MySQL to JSON format.&lt;br /&gt;
* Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.&lt;br /&gt;
* Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.&lt;br /&gt;
* Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project&lt;br /&gt;
* (https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.&lt;br /&gt;
* Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.&lt;br /&gt;
* Develop a new VM based honeypot/robe based on CRS v3.0.&lt;br /&gt;
* Develop new alternative small footprint honeypot/probe formats utilising Docker &amp;amp; Raspberry Pi.&lt;br /&gt;
* Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template Tool Project Template project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Tool Project Template must specify the minimum set of tabs a project should have, provide some an example layout on each tab, provide instructional text on how a project leader should modify the tab, and give some example text that illustrates how to create an actual project.&lt;br /&gt;
&lt;br /&gt;
It would also be ideal if the sample text was translated into different languages.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
Addtional Instructions for making changes:&lt;br /&gt;
&lt;br /&gt;
The About 'tab' on that page is done with a MediaWiki template.  If you log into the wiki page for your project and click the &amp;quot;Edit&amp;quot; button/link/tab in the top-right between 'Read' and 'View History', you'll see the edit page for the main body of your project page.&lt;br /&gt;
&lt;br /&gt;
If you scroll down below the form to edit that page (below the &amp;quot;Save page&amp;quot;, &amp;quot;Show preview&amp;quot;, &amp;quot;Show changes&amp;quot; buttons, you'll see some text with a triangle in front of it reading &amp;quot;Templates used on this page:&amp;quot;  A list will expand if you click on the triangle/text to show the templates that make up this page.  The one you want is the &amp;quot;Projects/OWASP Example Project About Page&amp;quot; - click the (edit) next to this to edit that template.  The direct link is: https://www.owasp.org/index.php?title=Projects/OWASP_Example_Project_About_Page&amp;amp;action=edit&lt;br /&gt;
&lt;br /&gt;
The template takes 'input' that are key/value pairs where you'll need to edit the stuff after the equals (=) like:&lt;br /&gt;
project_name =Place your project name here. &lt;br /&gt;
&lt;br /&gt;
You'd edit the bold bit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242831</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242831"/>
				<updated>2018-08-26T17:13:07Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: added link&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open_Security_Summit_Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 Conference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Adrian_Winckles Adrian Winckles]&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
The OWASP Tool Project Template is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] who created the OWASP Cornucopia project that the template was derived from&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chuck_Cooper Chuck Cooper] who edited the template to convert it from a documentation project to a Tool Project Template&lt;br /&gt;
* '''YOUR NAME BELONGS HERE AND YOU SHOULD REMOVE THE PRIOR 3 NAMES'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template Tool Project Template project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Tool Project Template must specify the minimum set of tabs a project should have, provide some an example layout on each tab, provide instructional text on how a project leader should modify the tab, and give some example text that illustrates how to create an actual project.&lt;br /&gt;
&lt;br /&gt;
It would also be ideal if the sample text was translated into different languages.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
Addtional Instructions for making changes:&lt;br /&gt;
&lt;br /&gt;
The About 'tab' on that page is done with a MediaWiki template.  If you log into the wiki page for your project and click the &amp;quot;Edit&amp;quot; button/link/tab in the top-right between 'Read' and 'View History', you'll see the edit page for the main body of your project page.&lt;br /&gt;
&lt;br /&gt;
If you scroll down below the form to edit that page (below the &amp;quot;Save page&amp;quot;, &amp;quot;Show preview&amp;quot;, &amp;quot;Show changes&amp;quot; buttons, you'll see some text with a triangle in front of it reading &amp;quot;Templates used on this page:&amp;quot;  A list will expand if you click on the triangle/text to show the templates that make up this page.  The one you want is the &amp;quot;Projects/OWASP Example Project About Page&amp;quot; - click the (edit) next to this to edit that template.  The direct link is: https://www.owasp.org/index.php?title=Projects/OWASP_Example_Project_About_Page&amp;amp;action=edit&lt;br /&gt;
&lt;br /&gt;
The template takes 'input' that are key/value pairs where you'll need to edit the stuff after the equals (=) like:&lt;br /&gt;
project_name =Place your project name here. &lt;br /&gt;
&lt;br /&gt;
You'd edit the bold bit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Adrian_Winckles&amp;diff=242462</id>
		<title>User:Adrian Winckles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Adrian_Winckles&amp;diff=242462"/>
				<updated>2018-08-10T21:50:57Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Adrian Winckles is the Director for the Cyber Security and Networking Research Group and Security Researcher at Anglia Ruskin University, Cambridge. &lt;br /&gt;
&lt;br /&gt;
His security research programs include (in)security of software defined networks/everything (SDN/Sdx), novel network botnet detection techniques within cloud and virtual environments, distributed honeypots for threat intelligence, advanced educational techniques for teaching cybercrime investigation and virtual digital crimescene/incident simulation. &lt;br /&gt;
&lt;br /&gt;
He has successfully completed a contribution to the European FP7 English Centre of Excellence for Cybercrime training, research and education (ECENTRE)  He has presented at both information security and cybercrime forensic international conferences including OWASP AppSec Europe, Cybercrime Forensics Education &amp;amp; Training (CFET) &amp;amp; CyberForensics. He is vice chair of the BCS Cybercrime Forensics Special Interest Group &amp;amp; Chair for the Cambridge Cluster of the UK Cyber Security Forum.  &lt;br /&gt;
&lt;br /&gt;
At OWASP he is&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/Cambridge|OWASP Cambridge Chapter Leader]](holds joint meetings with IET, BCS, IISP &amp;amp; (ISC)2) &lt;br /&gt;
* OWASP European Board Member&lt;br /&gt;
* Conference chair for OWASP AppSec Europe 2014 in Cambridge. &lt;br /&gt;
* OWASP Project Leader for the Application Security Curriculum Project.&lt;br /&gt;
* OWASP Project Leader for the [[OWASP_Honeypot_Project|OWASP Honeypot Project]].&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Adrian_Winckles&amp;diff=242461</id>
		<title>User:Adrian Winckles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Adrian_Winckles&amp;diff=242461"/>
				<updated>2018-08-10T21:49:43Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Adrian Winckles is the Director for the Cyber Security and Networking Research Group and Security Researcher at Anglia Ruskin University, Cambridge. &lt;br /&gt;
&lt;br /&gt;
His security research programs include (in)security of software defined networks/everything (SDN/Sdx), novel network botnet detection techniques within cloud and virtual environments, distributed honeypots for threat intelligence, advanced educational techniques for teaching cybercrime investigation and virtual digital crimescene/incident simulation. &lt;br /&gt;
&lt;br /&gt;
He has successfully completed a contribution to the European FP7 English Centre of Excellence for Cybercrime training, research and education (ECENTRE)  He has presented at both information security and cybercrime forensic international conferences including OWASP AppSec Europe, Cybercrime Forensics Education &amp;amp; Training (CFET) &amp;amp; CyberForensics. He is vice chair of the BCS Cybercrime Forensics Special Interest Group &amp;amp; Chair for the Cambridge Cluster of the UK Cyber Security Forum.  &lt;br /&gt;
&lt;br /&gt;
At OWASP he is&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/Cambridge|OWASP Cambridge]] Chapter Leader (holds joint meetings with IET, BCS, IISP &amp;amp; (ISC)2) &lt;br /&gt;
* OWASP European Board Member&lt;br /&gt;
* Conference chair for OWASP AppSec Europe 2014 in Cambridge. &lt;br /&gt;
* OWASP PRoject LEader for the Application Security Curriculum Project.&lt;br /&gt;
* OWASP Project Leader for the [[OWASP_Honeypot_Project|OWASP Honeypot Project]].&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Adrian_Winckles&amp;diff=242460</id>
		<title>User:Adrian Winckles</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Adrian_Winckles&amp;diff=242460"/>
				<updated>2018-08-10T21:47:33Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Adrian Winckles is the Director for the Cyber Security and Networking Research Group and Security Researcher at Anglia Ruskin University, Cambridge. &lt;br /&gt;
&lt;br /&gt;
His security research programs include (in)security of software defined networks/everything (SDN/Sdx), novel network botnet detection techniques within cloud and virtual environments, distributed honeypots for threat intelligence, advanced educational techniques for teaching cybercrime investigation and virtual digital crimescene/incident simulation. &lt;br /&gt;
&lt;br /&gt;
He has successfully completed a contribution to the European FP7 English Centre of Excellence for Cybercrime training, research and education (ECENTRE)  He has presented at both information security and cybercrime forensic international conferences including OWASP AppSec Europe, Cybercrime Forensics Education &amp;amp; Training (CFET) &amp;amp; CyberForensics. He is vice chair of the BCS Cybercrime Forensics Special Interest Group &amp;amp; Chair for the Cambridge Cluster of the UK Cyber Security Forum.  &lt;br /&gt;
&lt;br /&gt;
At OWASP he is&lt;br /&gt;
&lt;br /&gt;
* [[https://www.owasp.org/index.php/Cambridge|OWASP Cambridge]] Chapter Leader (holds joint meetings with IET, BCS, IISP &amp;amp; (ISC)2) &lt;br /&gt;
* OWASP European Board Member&lt;br /&gt;
* Conference chair for OWASP AppSec Europe 2014 in Cambridge. He is also c&lt;br /&gt;
* OWASP Project Leader for the [[OWASP_Honeypot_Project|OWASP Honeypot Project]].&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242459</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242459"/>
				<updated>2018-08-10T20:31:08Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open_Security_Summit_Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 Conference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* Adrian Winckles&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
The OWASP Tool Project Template is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] who created the OWASP Cornucopia project that the template was derived from&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chuck_Cooper Chuck Cooper] who edited the template to convert it from a documentation project to a Tool Project Template&lt;br /&gt;
* '''YOUR NAME BELONGS HERE AND YOU SHOULD REMOVE THE PRIOR 3 NAMES'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template Tool Project Template project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Tool Project Template must specify the minimum set of tabs a project should have, provide some an example layout on each tab, provide instructional text on how a project leader should modify the tab, and give some example text that illustrates how to create an actual project.&lt;br /&gt;
&lt;br /&gt;
It would also be ideal if the sample text was translated into different languages.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
Addtional Instructions for making changes:&lt;br /&gt;
&lt;br /&gt;
The About 'tab' on that page is done with a MediaWiki template.  If you log into the wiki page for your project and click the &amp;quot;Edit&amp;quot; button/link/tab in the top-right between 'Read' and 'View History', you'll see the edit page for the main body of your project page.&lt;br /&gt;
&lt;br /&gt;
If you scroll down below the form to edit that page (below the &amp;quot;Save page&amp;quot;, &amp;quot;Show preview&amp;quot;, &amp;quot;Show changes&amp;quot; buttons, you'll see some text with a triangle in front of it reading &amp;quot;Templates used on this page:&amp;quot;  A list will expand if you click on the triangle/text to show the templates that make up this page.  The one you want is the &amp;quot;Projects/OWASP Example Project About Page&amp;quot; - click the (edit) next to this to edit that template.  The direct link is: https://www.owasp.org/index.php?title=Projects/OWASP_Example_Project_About_Page&amp;amp;action=edit&lt;br /&gt;
&lt;br /&gt;
The template takes 'input' that are key/value pairs where you'll need to edit the stuff after the equals (=) like:&lt;br /&gt;
project_name =Place your project name here. &lt;br /&gt;
&lt;br /&gt;
You'd edit the bold bit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242458</id>
		<title>OWASP Honeypot Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Honeypot_Project&amp;diff=242458"/>
				<updated>2018-08-10T20:30:01Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: Added presentatiosn and videos&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Main=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:OWASP_Project_Header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;width:100%;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
== OWASP Honeypot Project Background ==&lt;br /&gt;
&lt;br /&gt;
Scientists at National Institute of Science and Technology claim that 92% of security vulnerabilities lie within the applications; handing the advantage over to the cyber-thieves. Many of these bugs can be eliminated simply by improving the code in which the software applications are written. The UK government estimates that the cost from cyber-attacks to be on average around £310,000 for a UK SME per annum, with almost 1 million UK SMEs having suffered from a data breach in 2017. SMEs are 70% more likely to be attacked than larger organisations, simply because they lack the ability to protect themselves. Regulations such as GDPR (which replaced the Data Protection Act in May 2018) exist to enforce that organisations protect data. Yet little in the way of understanding the threat exposures exist, with even less guidance on how to protect against the risks.&lt;br /&gt;
&lt;br /&gt;
The web application Defender's community already exists. Not-for-profit charitable organisations such as OWASP (Open Web Application Security Project) raison d’etre is to provide an open source community to help organisations develop safer software applications that can be trusted to be secure against criminal attack. TSI (the Trusted Software Initiative) and OWASP create educational information on how software should be written and some of the more obvious bugs that are left open to give attackers access to confidential information. &lt;br /&gt;
&lt;br /&gt;
==Introduction ==&lt;br /&gt;
Researchers are beginning to realise that by “watching” how Internet criminals behave, we can learn directly from their work flow activities, and use this information to protect ourselves. The past 20 years of research into Internet security, has made internal hosting infrastructures more secure, especially in large businesses. So today, Internet criminals take advantage of bugs in the software applications themselves. These bugs originate wholly because software has been poorly written and designed. &lt;br /&gt;
&lt;br /&gt;
Large businesses may already employ a team of people to evaluate and protect any software facing the Internet. However, a key area lacking protection are the millions of smaller businesses worldwide that trade via the Internet, right down to the one person hobby-business selling products from home on eBay.&lt;br /&gt;
&lt;br /&gt;
This project is about collecting and maximising intelligence from the cyber-battlefield that exists between attackers with criminal intent and the people creating the software upon which the Internet runs. By collecting intel on what the criminals are doing, we can define rules for writing software that can be fed back to the front line troops writing the code, so they can close these bugs and other vulnerabilities in their software. An attacker only needs to be lucky once, whereas we need to be lucky in protecting against all attacks, all of the time. By sharing the findings from our reconnoitres out in the field, this project provides educational information back to the community of software coders, be they professional developers or school kids working in their bedrooms. Today, the advantage lies clearly with the attackers. With this kind of threat information we take the advantage back into the hands of the defenders.&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:25px;width:34%;border-right: 1px dotted gray;padding-right:25px;&amp;quot; valign=&amp;quot;top&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Description ==&lt;br /&gt;
The goal of the OWASP ''Honeypot Project'' is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks. Within this project, Anglia Ruskin University is leading the collection, storage and analysis of threat intelligence data. &lt;br /&gt;
&lt;br /&gt;
The purpose of this part of the project is to capture intelligence on attacker activity against web applications and utilise this intelligence as ways to protect software against attacks. Honeypots are an established industry technique to provide a realistic target to entice a criminal, whilst encouraging them to divulge the tools and techniques they use during an attack. Like bees to a honeypot. These honeypots are safely designed to contain no information of monetary use to an attacker, and hence provide no risk to the businesses implementing them. &lt;br /&gt;
&lt;br /&gt;
The project will create honeypots that the community can distribute within their own networks. With enough honeypots globally distributed, we will be in a position to aggregate attack techniques to better understand and protect against the techniques used by attackers. With this information, we will be in a position to create educational information, such as rules and strategies, that application writers can use to ensure that any detected bugs and vulnerabilities are closed.&lt;br /&gt;
&lt;br /&gt;
Project progression:&lt;br /&gt;
&lt;br /&gt;
# '''Honeypot software.''' The honeypot software that is to be provided to the community to place in their networks has been written. Honeypots are available in a variety of forms, to make deployment as flexible as possible and appeal to a diverse a user set as possible.&lt;br /&gt;
# '''Collection software.''' The centralised collection software has been written and evaluated in a student driven proof-of-concept project. Honeypots have been attacked in a laboratory situation and have reported both the steps taken by the attacker and what they have attacked, back to the collection software.&lt;br /&gt;
# '''Rollout to the Community.''' The project now needs a dedicated infrastructure platform in place that is available to the entire community to start collecting intelligence back from community deployed honeypots. This infrastructure will run the collector software, analysis programmes and provide a portal for communicating our finds and recommendations back to the community in a meaningful manner.&lt;br /&gt;
# '''Going Forward'''. Toolkits and skills used by attackers do not stand still.  As existing bugs are plugged, others open. . Follow up stages for the project will be to create a messaging system to automatically update the community on findings of significant risk in their existing code that requires attention. &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;padding-left:20px;width:32%;&amp;quot; valign=&amp;quot;top&amp;quot; | &lt;br /&gt;
&lt;br /&gt;
== What is the OWASP Honeypot Project? ==&lt;br /&gt;
The OWASP Honeypot Project provides:&lt;br /&gt;
* Real-time, detailed Web Application Attack Data&lt;br /&gt;
* Threat Reports to the community&lt;br /&gt;
&lt;br /&gt;
== News and Events ==&lt;br /&gt;
&lt;br /&gt;
* [[Media:Open_Security_Summit_Honeypot.pdf|OWASP Honeypot Project Reboot]] at Open Security Summit 2018 &amp;amp; CRS Community Summit 2018 (hosted at AppSec Europe 2018)&lt;br /&gt;
* [https://drive.google.com/open?id=1ZVg8C8Fkp-q6SoMtYUR2NAmCOg319eRl CRS Community Summit 2018 Video Presentations] (hosted at Appsec Europe 2018, QE2 COnference Centre, London.&lt;br /&gt;
&lt;br /&gt;
== Project Resources ==&lt;br /&gt;
&lt;br /&gt;
== Project Leader ==&lt;br /&gt;
* Adrian Winckles&lt;br /&gt;
&lt;br /&gt;
== Related Projects ==&lt;br /&gt;
&lt;br /&gt;
==Licensing==&lt;br /&gt;
&lt;br /&gt;
==Classifications==&lt;br /&gt;
&lt;br /&gt;
   {| width=&amp;quot;200&amp;quot; cellpadding=&amp;quot;2&amp;quot;&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Project_Type_Files_TOOL.jpg|link=https://www.owasp.org/index.php/Category:OWASP_Tool]]&lt;br /&gt;
   |-&lt;br /&gt;
   | rowspan=&amp;quot;2&amp;quot; width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-incubator-trans-85.png|link=https://www.owasp.org/index.php/OWASP_Project_Stages#tab=Incubator_Projects|Incubator Project]]&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-builders-small.png|link=Builders]]  &lt;br /&gt;
   |-&lt;br /&gt;
   | width=&amp;quot;50%&amp;quot; valign=&amp;quot;top&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Owasp-defenders-small.png|link=Defenders]]&lt;br /&gt;
   |-&lt;br /&gt;
   | colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; | [[File:Agplv3-155x51.png|link=http://www.gnu.org/licenses/agpl-3.0.html|Affero General Public License 3.0]]&lt;br /&gt;
   |}&lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=FAQs=&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;==How can I participate in your project?==&lt;br /&gt;
All you have to do is make the Project Leader's aware of your available time to contribute to the project. It is also important to let the Leader's know how you would like to contribute and pitch in to help the project meet it's goals and milestones. There are many different ways you can contribute to an OWASP Project, but communication with the leads is key. &lt;br /&gt;
&lt;br /&gt;
==If I am not a programmer can I participate in your project?==&lt;br /&gt;
Yes, you can certainly participate in the project if you are not a programmer or technical. The project needs different skills and expertise and different times during its development. Currently, we are looking for researchers, writers, graphic designers, and a project administrator.   See the Road Map and Getting Involved tab for more details.&lt;br /&gt;
&lt;br /&gt;
= Acknowledgements =&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
The OWASP Tool Project Template is developed by a worldwide team of volunteers. A live update of project  [https://github.com/OWASP/Security-Principles/graphs/contributors contributors is found here]. &lt;br /&gt;
&lt;br /&gt;
The first contributors to the project were:&lt;br /&gt;
&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Clerkendweller Colin Watson] who created the OWASP Cornucopia project that the template was derived from&lt;br /&gt;
* [https://www.owasp.org/index.php/User:Chuck_Cooper Chuck Cooper] who edited the template to convert it from a documentation project to a Tool Project Template&lt;br /&gt;
* '''YOUR NAME BELONGS HERE AND YOU SHOULD REMOVE THE PRIOR 3 NAMES'''&lt;br /&gt;
&lt;br /&gt;
= Road Map and Getting Involved =&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
==Roadmap==&lt;br /&gt;
As of &amp;lt;strong&amp;gt;November, 2013, the highest priorities for the next 6 months&amp;lt;/strong&amp;gt; are:&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Complete the first draft of the Tool Project Template&lt;br /&gt;
* Get other people to review the Tool Project Template and provide feedback&lt;br /&gt;
* Incorporate feedback into changes in the Tool Project Template&lt;br /&gt;
* Finalize the Tool Project template and have it reviewed to be promoted from an Incubator Project to a Lab Project&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Subsequent Releases will add&lt;br /&gt;
&amp;lt;strong&amp;gt;&lt;br /&gt;
* Internationalization Support&lt;br /&gt;
* Additional Unit Tests&lt;br /&gt;
* Automated Regression tests&lt;br /&gt;
&amp;lt;/strong&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Getting Involved==&lt;br /&gt;
Involvement in the development and promotion of &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; is actively encouraged!&lt;br /&gt;
You do not have to be a security expert or a programmer to contribute.&lt;br /&gt;
Some of the ways you can help are as follows:&lt;br /&gt;
&lt;br /&gt;
===Coding===&lt;br /&gt;
We could implement some of the later items on the roadmap sooner if someone wanted to help out with unit or automated regression tests&lt;br /&gt;
===Localization===&lt;br /&gt;
Are you fluent in another language? Can you help translate the text strings in the &amp;lt;strong&amp;gt;Tool Project Template&amp;lt;/strong&amp;gt; into that language?&lt;br /&gt;
===Testing===&lt;br /&gt;
Do you have a flair for finding bugs in software? We want to product a high quality product, so any help with Quality Assurance would be greatly appreciated. Let us know if you can offer your help.&lt;br /&gt;
===Feedback===&lt;br /&gt;
Please use the [https://lists.owasp.org/mailman/listinfo/OWASP_Tool_Project_Template Tool Project Template project mailing list] for feedback about:&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What do like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What don't you like?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;What features would you like to see prioritized on the roadmap?&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Minimum Viable Product=&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Tool Project Template must specify the minimum set of tabs a project should have, provide some an example layout on each tab, provide instructional text on how a project leader should modify the tab, and give some example text that illustrates how to create an actual project.&lt;br /&gt;
&lt;br /&gt;
It would also be ideal if the sample text was translated into different languages.&lt;br /&gt;
&lt;br /&gt;
=Project About=&lt;br /&gt;
Addtional Instructions for making changes:&lt;br /&gt;
&lt;br /&gt;
The About 'tab' on that page is done with a MediaWiki template.  If you log into the wiki page for your project and click the &amp;quot;Edit&amp;quot; button/link/tab in the top-right between 'Read' and 'View History', you'll see the edit page for the main body of your project page.&lt;br /&gt;
&lt;br /&gt;
If you scroll down below the form to edit that page (below the &amp;quot;Save page&amp;quot;, &amp;quot;Show preview&amp;quot;, &amp;quot;Show changes&amp;quot; buttons, you'll see some text with a triangle in front of it reading &amp;quot;Templates used on this page:&amp;quot;  A list will expand if you click on the triangle/text to show the templates that make up this page.  The one you want is the &amp;quot;Projects/OWASP Example Project About Page&amp;quot; - click the (edit) next to this to edit that template.  The direct link is: https://www.owasp.org/index.php?title=Projects/OWASP_Example_Project_About_Page&amp;amp;action=edit&lt;br /&gt;
&lt;br /&gt;
The template takes 'input' that are key/value pairs where you'll need to edit the stuff after the equals (=) like:&lt;br /&gt;
project_name =Place your project name here. &lt;br /&gt;
&lt;br /&gt;
You'd edit the bold bit.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Instructions are in RED and should be removed from your document by deleting the text with the span tags.--&amp;gt;&lt;br /&gt;
{{:Projects/OWASP_Example_Project_About_Page}} &lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Project]]  &lt;br /&gt;
[[Category:OWASP_Builders]] &lt;br /&gt;
[[Category:OWASP_Defenders]]  &lt;br /&gt;
[[Category:OWASP_Tool]]&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Open_Security_Summit_Honeypot.pdf&amp;diff=242457</id>
		<title>File:Open Security Summit Honeypot.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Open_Security_Summit_Honeypot.pdf&amp;diff=242457"/>
				<updated>2018-08-10T19:28:09Z</updated>
		
		<summary type="html">&lt;p&gt;Adrian Winckles: Proposed Reboot of the OWASP Web Honeypot Project at Open Security Summit 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Proposed Reboot of the OWASP Web Honeypot Project at Open Security Summit 2018&lt;/div&gt;</summary>
		<author><name>Adrian Winckles</name></author>	</entry>

	</feed>