<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andipannell</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andipannell"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Andipannell"/>
		<updated>2026-05-23T03:50:07Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=254912</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=254912"/>
				<updated>2019-09-24T07:40:34Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: correction to potential December 2019 meetup&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
'''Next Event:'''&lt;br /&gt;
&lt;br /&gt;
03/12/2019&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://groups.google.com/a/owasp.org/forum/#!forum/newcastle-chapter chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle] and/or [https://owasp.slack.com/messages/C0CLHS45S Slack].&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
'''2019 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/09/2019 from 18:00 to 21:00 at Northumbria University, City Campus East&lt;br /&gt;
&lt;br /&gt;
'''Talk 1'''&lt;br /&gt;
&lt;br /&gt;
Title: Stalk Awareness&lt;br /&gt;
&lt;br /&gt;
Speaker: Cian (@nscrutables)&lt;br /&gt;
&lt;br /&gt;
Description: We often focus on nation states and corporation's role in eroding our privacy and expanding omnipresent surveillance worldwide, meanwhile an entire niche industry that caters to regular consumers who want similar spying capabilities has slipped largely under the radar. Mobile apps that are designed to enable toxic and abusive behavior are being openly sold on the internet, marketed directly to abusers, these apps have come to be termed &amp;quot;stalkerware&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This talk will present analysis of the stalkerware industry, its products, marketing and the scope of the problem it represents, as well as potential solutions. I'll be examining these topics from both&lt;br /&gt;
&lt;br /&gt;
a technical and non-technical standpoint, based on many months of personal research.&lt;br /&gt;
&lt;br /&gt;
'''Talk 2'''&lt;br /&gt;
&lt;br /&gt;
Title: Rethinking Threat Intelligence - a quick glance at intelligence led risk management - [https://www.owasp.org/images/c/cc/IntelligenceLedRiskManagement.pptx Slides]&lt;br /&gt;
&lt;br /&gt;
Speaker: Adam Pickering (&amp;lt;nowiki&amp;gt;https://twitter.com/Adam_P81&amp;lt;/nowiki&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
Description: 45 min chat about rethinking how we use threat intelligence capabilities within enterprise to bring about changes to the way we deploy countermeasures against threat actors&lt;br /&gt;
----13/06/2019 from 18:00 to 21:00 at Eagle Lab Newcastle, Tus Park&lt;br /&gt;
&lt;br /&gt;
Red Team versus Blue Team event&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Red Teaming a view from the field'''&lt;br /&gt;
&lt;br /&gt;
Speakers: Andi Pannell (&amp;lt;nowiki&amp;gt;https://twitter.com/dr0idandy&amp;lt;/nowiki&amp;gt;) , Robin Fewster (&amp;lt;nowiki&amp;gt;https://twitter.com/listenerstation&amp;lt;/nowiki&amp;gt;), Gavin Johnson-Lynn (&amp;lt;nowiki&amp;gt;https://twitter.com/gav_jl&amp;lt;/nowiki&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
Description: A talk about what red teaming is, how it is different from a penetration test, and then we’ll reveal some hardware we use during red team engagements and some success stories.&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Protecting the museum – HIPS'''&lt;br /&gt;
Speaker: Marek Banas&lt;br /&gt;
Description: How you can minimise the manual labour with increasing the security on legacy servers, plus some issues we hit while choosing the solutions, challenges we had.&lt;br /&gt;
&lt;br /&gt;
Event is detailed here: [https://www.meetup.com/OWASP-Newcastle-Chapter/events/260856686/ OWASP Newcastle Meetup June 2019]&lt;br /&gt;
----26/02/2019 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-403.&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Matt Wixey (@darkartlab)'''&lt;br /&gt;
&lt;br /&gt;
The talk will be three smaller talks, covering: &lt;br /&gt;
# Remote online social engineering (how attackers use catfishing techniques) &lt;br /&gt;
# Hacking with light and sound (using infrared, ultrasound, and lasers to exfiltrate data and disrupt sensors) &lt;br /&gt;
# Attack linkage (using granular attack behaviours to link different cyber attacks)&lt;br /&gt;
'''Talk 2: Kathryn Cardose (@AGeordieLass)'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Getting stakeholders on board&amp;quot;.&lt;br /&gt;
* So you’ve nailed the tech, you’ve found the controls, you’ve requested remediation.....how do you get stakeholders of all levels to buy in and support security?&lt;br /&gt;
----'''2018 Dates'''&lt;br /&gt;
----25/09/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andy Ferguson: &amp;quot;Don't tell your Big Brother&amp;quot; Encryption tips and tricks.'''   &lt;br /&gt;
* '''Gavin Johnson-Lynn: My Path to CSSLP.''' Join me on a journey from a vague knowledge of security to gaining a valued security certification. For anyone considering certification as a route to success, self-improvement, or even just some thoughts on how I approached it. We’ll look at what I learned and how I learned it, including some tricks I picked up along the way to help cram information into my brain (and keep it there).  &lt;br /&gt;
The event is detailed here: https://www.eventbrite.com/e/owasp-newcastle-september-2018-meetup-tickets-49842084015&lt;br /&gt;
----26/06/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
We held our first CTF (Capture The Flag) event.&lt;br /&gt;
&lt;br /&gt;
The CTF event was facilitated by Secarma. The attendees were split into groups, each group had their own sandboxed environment to connect into, and prizes were offered to the teams who captured the most flags. The event is detailed here: [https://www.eventbrite.com/e/owasp-newcastle-june-2018-capture-the-flag-tickets-43192186994?aff=eac2 https://www.eventbrite.com/e/owasp-newcastle-june-2018-capture-the-flag-tickets-43192186994]&lt;br /&gt;
----27/03/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Andi Pannell: The Internet of (broken) things.''' This talk will focus on the internet of things, how we’re connecting everything to the internet now, because why not add a WiFi connection to your Fridge? And how security is unlikely to be a consideration when making these products. I’ll also talk about DefCon, as last year my company sent a team of us to DefCon 25 in Las Vegas, explaining what DefCon is, what happens there, and how we won the IoT Village 0-day contest and I'll conclude with a '''live hacking demo'''.&lt;br /&gt;
* '''Colin Watson: An introduction to the OWASP automated threats to web applications.''' Web applications are subjected to unwanted automated usage – day in, day out. The vast majority of these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is often mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the attacker’s primary intent. [https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications Project page] | [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Handbook PDF file] | [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-23540699.html Handbook print version] | [https://www.owasp.org/index.php/File:AutomatedThreats-Newcastle-20180327.pptx Newcastle PPT presentation]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/01/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----'''2017 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data. [[Media:Modern_DevOps_and_security.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://www.droidandy.com/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Ben Lee''' and '''Ross Dargan''': '''The problems with proving identity.''' In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers. The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…* (*Talk may not be historically accurate! ;)) [[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
* '''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks.''' The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities. Take a copy of the game away with you - it is suitable for developers of all sizes. [[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
* '''Michael Haselhurst - Automated Security Testing Using The ZAP API.''' This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi. [[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
* '''Mike Goodwin - Real world defence in depth (part 1).''' Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality. [[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Robin Fewster|Robin Fewster]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here]&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=254911</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=254911"/>
				<updated>2019-09-24T07:39:01Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: updated September 2019&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
'''Next Event:'''&lt;br /&gt;
&lt;br /&gt;
6/12/2019&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://groups.google.com/a/owasp.org/forum/#!forum/newcastle-chapter chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle] and/or [https://owasp.slack.com/messages/C0CLHS45S Slack].&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
'''2019 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/09/2019 from 18:00 to 21:00 at Northumbria University, City Campus East&lt;br /&gt;
&lt;br /&gt;
'''Talk 1'''&lt;br /&gt;
&lt;br /&gt;
Title: Stalk Awareness&lt;br /&gt;
&lt;br /&gt;
Speaker: Cian (@nscrutables)&lt;br /&gt;
&lt;br /&gt;
Description: We often focus on nation states and corporation's role in eroding our privacy and expanding omnipresent surveillance worldwide, meanwhile an entire niche industry that caters to regular consumers who want similar spying capabilities has slipped largely under the radar. Mobile apps that are designed to enable toxic and abusive behavior are being openly sold on the internet, marketed directly to abusers, these apps have come to be termed &amp;quot;stalkerware&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This talk will present analysis of the stalkerware industry, its products, marketing and the scope of the problem it represents, as well as potential solutions. I'll be examining these topics from both&lt;br /&gt;
&lt;br /&gt;
a technical and non-technical standpoint, based on many months of personal research.&lt;br /&gt;
&lt;br /&gt;
'''Talk 2'''&lt;br /&gt;
&lt;br /&gt;
Title: Rethinking Threat Intelligence - a quick glance at intelligence led risk management - [https://www.owasp.org/images/c/cc/IntelligenceLedRiskManagement.pptx Slides]&lt;br /&gt;
&lt;br /&gt;
Speaker: Adam Pickering (&amp;lt;nowiki&amp;gt;https://twitter.com/Adam_P81&amp;lt;/nowiki&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
Description: 45 min chat about rethinking how we use threat intelligence capabilities within enterprise to bring about changes to the way we deploy countermeasures against threat actors&lt;br /&gt;
----13/06/2019 from 18:00 to 21:00 at Eagle Lab Newcastle, Tus Park&lt;br /&gt;
&lt;br /&gt;
Red Team versus Blue Team event&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Red Teaming a view from the field'''&lt;br /&gt;
&lt;br /&gt;
Speakers: Andi Pannell (&amp;lt;nowiki&amp;gt;https://twitter.com/dr0idandy&amp;lt;/nowiki&amp;gt;) , Robin Fewster (&amp;lt;nowiki&amp;gt;https://twitter.com/listenerstation&amp;lt;/nowiki&amp;gt;), Gavin Johnson-Lynn (&amp;lt;nowiki&amp;gt;https://twitter.com/gav_jl&amp;lt;/nowiki&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
Description: A talk about what red teaming is, how it is different from a penetration test, and then we’ll reveal some hardware we use during red team engagements and some success stories.&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Protecting the museum – HIPS'''&lt;br /&gt;
Speaker: Marek Banas&lt;br /&gt;
Description: How you can minimise the manual labour with increasing the security on legacy servers, plus some issues we hit while choosing the solutions, challenges we had.&lt;br /&gt;
&lt;br /&gt;
Event is detailed here: [https://www.meetup.com/OWASP-Newcastle-Chapter/events/260856686/ OWASP Newcastle Meetup June 2019]&lt;br /&gt;
----26/02/2019 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-403.&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Matt Wixey (@darkartlab)'''&lt;br /&gt;
&lt;br /&gt;
The talk will be three smaller talks, covering: &lt;br /&gt;
# Remote online social engineering (how attackers use catfishing techniques) &lt;br /&gt;
# Hacking with light and sound (using infrared, ultrasound, and lasers to exfiltrate data and disrupt sensors) &lt;br /&gt;
# Attack linkage (using granular attack behaviours to link different cyber attacks)&lt;br /&gt;
'''Talk 2: Kathryn Cardose (@AGeordieLass)'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Getting stakeholders on board&amp;quot;.&lt;br /&gt;
* So you’ve nailed the tech, you’ve found the controls, you’ve requested remediation.....how do you get stakeholders of all levels to buy in and support security?&lt;br /&gt;
----'''2018 Dates'''&lt;br /&gt;
----25/09/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andy Ferguson: &amp;quot;Don't tell your Big Brother&amp;quot; Encryption tips and tricks.'''   &lt;br /&gt;
* '''Gavin Johnson-Lynn: My Path to CSSLP.''' Join me on a journey from a vague knowledge of security to gaining a valued security certification. For anyone considering certification as a route to success, self-improvement, or even just some thoughts on how I approached it. We’ll look at what I learned and how I learned it, including some tricks I picked up along the way to help cram information into my brain (and keep it there).  &lt;br /&gt;
The event is detailed here: https://www.eventbrite.com/e/owasp-newcastle-september-2018-meetup-tickets-49842084015&lt;br /&gt;
----26/06/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
We held our first CTF (Capture The Flag) event.&lt;br /&gt;
&lt;br /&gt;
The CTF event was facilitated by Secarma. The attendees were split into groups, each group had their own sandboxed environment to connect into, and prizes were offered to the teams who captured the most flags. The event is detailed here: [https://www.eventbrite.com/e/owasp-newcastle-june-2018-capture-the-flag-tickets-43192186994?aff=eac2 https://www.eventbrite.com/e/owasp-newcastle-june-2018-capture-the-flag-tickets-43192186994]&lt;br /&gt;
----27/03/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Andi Pannell: The Internet of (broken) things.''' This talk will focus on the internet of things, how we’re connecting everything to the internet now, because why not add a WiFi connection to your Fridge? And how security is unlikely to be a consideration when making these products. I’ll also talk about DefCon, as last year my company sent a team of us to DefCon 25 in Las Vegas, explaining what DefCon is, what happens there, and how we won the IoT Village 0-day contest and I'll conclude with a '''live hacking demo'''.&lt;br /&gt;
* '''Colin Watson: An introduction to the OWASP automated threats to web applications.''' Web applications are subjected to unwanted automated usage – day in, day out. The vast majority of these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is often mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the attacker’s primary intent. [https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications Project page] | [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Handbook PDF file] | [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-23540699.html Handbook print version] | [https://www.owasp.org/index.php/File:AutomatedThreats-Newcastle-20180327.pptx Newcastle PPT presentation]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/01/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----'''2017 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data. [[Media:Modern_DevOps_and_security.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://www.droidandy.com/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Ben Lee''' and '''Ross Dargan''': '''The problems with proving identity.''' In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers. The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…* (*Talk may not be historically accurate! ;)) [[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
* '''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks.''' The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities. Take a copy of the game away with you - it is suitable for developers of all sizes. [[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
* '''Michael Haselhurst - Automated Security Testing Using The ZAP API.''' This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi. [[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
* '''Mike Goodwin - Real world defence in depth (part 1).''' Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality. [[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Robin Fewster|Robin Fewster]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here]&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:IntelligenceLedRiskManagement.pptx&amp;diff=254910</id>
		<title>File:IntelligenceLedRiskManagement.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:IntelligenceLedRiskManagement.pptx&amp;diff=254910"/>
				<updated>2019-09-24T07:38:13Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: Talk by Adam Pickering about Intelligence Led Risk Management. Delivered at OWASP Newcastle in September 2019&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Talk by Adam Pickering about Intelligence Led Risk Management. Delivered at OWASP Newcastle in September 2019&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=253945</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=253945"/>
				<updated>2019-08-20T10:14:20Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: update for September 2019 event&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
'''Next Event:'''&lt;br /&gt;
&lt;br /&gt;
23/09/2019 from 18:00 to 21:00 at Northumbria University, City Campus East, room to be confirmed&lt;br /&gt;
&lt;br /&gt;
1800 - 1815 | Arrival and networking&lt;br /&gt;
&lt;br /&gt;
1815 - 1820 | OWASP Newcastle Welcome&lt;br /&gt;
&lt;br /&gt;
1820 - 1920 | Talk 1&lt;br /&gt;
&lt;br /&gt;
1920 - 2000 | Pizza and networking&lt;br /&gt;
&lt;br /&gt;
2000 - 2045 | Talk 2&lt;br /&gt;
&lt;br /&gt;
2045 - onwards | Pub?&lt;br /&gt;
&lt;br /&gt;
'''Talk 1'''&lt;br /&gt;
&lt;br /&gt;
Title: Stalk Awareness&lt;br /&gt;
&lt;br /&gt;
Speaker: Cian (@nscrutables)&lt;br /&gt;
&lt;br /&gt;
Description: We often focus on nation states and corporation's role in eroding our privacy and expanding omnipresent surveillance worldwide, meanwhile an entire niche industry that caters to regular consumers who want similar spying capabilities has slipped largely under the radar. Mobile apps that are designed to enable toxic and abusive behavior are being openly sold on the internet, marketed directly to abusers, these apps have come to be termed &amp;quot;stalkerware&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
This talk will present analysis of the stalkerware industry, its products, marketing and the scope of the problem it represents, as well as potential solutions. I'll be examining these topics from both&lt;br /&gt;
&lt;br /&gt;
a technical and non-technical standpoint, based on many months of personal research.&lt;br /&gt;
&lt;br /&gt;
'''Talk 2'''&lt;br /&gt;
&lt;br /&gt;
Title: Rethinking Threat Intelligence - a quick glance at intelligence led risk management&lt;br /&gt;
&lt;br /&gt;
Speaker: Adam Pickering (&amp;lt;nowiki&amp;gt;https://twitter.com/Adam_P81&amp;lt;/nowiki&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
Description: 45 min chat about rethinking how we use threat intelligence capabilities within enterprise to bring about changes to the way we deploy countermeasures against threat actors&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://groups.google.com/a/owasp.org/forum/#!forum/newcastle-chapter chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle] and/or [https://owasp.slack.com/messages/C0CLHS45S Slack].&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
'''2019 Dates'''&lt;br /&gt;
----13/06/2019 from 18:00 to 21:00 at Eagle Lab Newcastle, Tus Park&lt;br /&gt;
&lt;br /&gt;
Red Team versus Blue Team event&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Red Teaming a view from the field'''&lt;br /&gt;
&lt;br /&gt;
Speakers: Andi Pannell (&amp;lt;nowiki&amp;gt;https://twitter.com/dr0idandy&amp;lt;/nowiki&amp;gt;) , Robin Fewster (&amp;lt;nowiki&amp;gt;https://twitter.com/listenerstation&amp;lt;/nowiki&amp;gt;), Gavin Johnson-Lynn (&amp;lt;nowiki&amp;gt;https://twitter.com/gav_jl&amp;lt;/nowiki&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
Description: A talk about what red teaming is, how it is different from a penetration test, and then we’ll reveal some hardware we use during red team engagements and some success stories.&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Protecting the museum – HIPS'''&lt;br /&gt;
Speaker: Marek Banas&lt;br /&gt;
Description: How you can minimise the manual labour with increasing the security on legacy servers, plus some issues we hit while choosing the solutions, challenges we had.&lt;br /&gt;
&lt;br /&gt;
Event is detailed here: [https://www.meetup.com/OWASP-Newcastle-Chapter/events/260856686/ OWASP Newcastle Meetup June 2019]&lt;br /&gt;
----26/02/2019 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-403.&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Matt Wixey (@darkartlab)'''&lt;br /&gt;
&lt;br /&gt;
The talk will be three smaller talks, covering: &lt;br /&gt;
# Remote online social engineering (how attackers use catfishing techniques) &lt;br /&gt;
# Hacking with light and sound (using infrared, ultrasound, and lasers to exfiltrate data and disrupt sensors) &lt;br /&gt;
# Attack linkage (using granular attack behaviours to link different cyber attacks)&lt;br /&gt;
'''Talk 2: Kathryn Cardose (@AGeordieLass)'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Getting stakeholders on board&amp;quot;.&lt;br /&gt;
* So you’ve nailed the tech, you’ve found the controls, you’ve requested remediation.....how do you get stakeholders of all levels to buy in and support security?&lt;br /&gt;
----'''2018 Dates'''&lt;br /&gt;
----25/09/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andy Ferguson: &amp;quot;Don't tell your Big Brother&amp;quot; Encryption tips and tricks.'''   &lt;br /&gt;
* '''Gavin Johnson-Lynn: My Path to CSSLP.''' Join me on a journey from a vague knowledge of security to gaining a valued security certification. For anyone considering certification as a route to success, self-improvement, or even just some thoughts on how I approached it. We’ll look at what I learned and how I learned it, including some tricks I picked up along the way to help cram information into my brain (and keep it there).  &lt;br /&gt;
The event is detailed here: https://www.eventbrite.com/e/owasp-newcastle-september-2018-meetup-tickets-49842084015&lt;br /&gt;
----26/06/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
We held our first CTF (Capture The Flag) event.&lt;br /&gt;
&lt;br /&gt;
The CTF event was facilitated by Secarma. The attendees were split into groups, each group had their own sandboxed environment to connect into, and prizes were offered to the teams who captured the most flags. The event is detailed here: [https://www.eventbrite.com/e/owasp-newcastle-june-2018-capture-the-flag-tickets-43192186994?aff=eac2 https://www.eventbrite.com/e/owasp-newcastle-june-2018-capture-the-flag-tickets-43192186994]&lt;br /&gt;
----27/03/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Andi Pannell: The Internet of (broken) things.''' This talk will focus on the internet of things, how we’re connecting everything to the internet now, because why not add a WiFi connection to your Fridge? And how security is unlikely to be a consideration when making these products. I’ll also talk about DefCon, as last year my company sent a team of us to DefCon 25 in Las Vegas, explaining what DefCon is, what happens there, and how we won the IoT Village 0-day contest and I'll conclude with a '''live hacking demo'''.&lt;br /&gt;
* '''Colin Watson: An introduction to the OWASP automated threats to web applications.''' Web applications are subjected to unwanted automated usage – day in, day out. The vast majority of these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is often mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the attacker’s primary intent. [https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications Project page] | [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Handbook PDF file] | [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-23540699.html Handbook print version] | [https://www.owasp.org/index.php/File:AutomatedThreats-Newcastle-20180327.pptx Newcastle PPT presentation]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/01/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----'''2017 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data. [[Media:Modern_DevOps_and_security.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://www.droidandy.com/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Ben Lee''' and '''Ross Dargan''': '''The problems with proving identity.''' In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers. The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…* (*Talk may not be historically accurate! ;)) [[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
* '''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks.''' The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities. Take a copy of the game away with you - it is suitable for developers of all sizes. [[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
* '''Michael Haselhurst - Automated Security Testing Using The ZAP API.''' This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi. [[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
* '''Mike Goodwin - Real world defence in depth (part 1).''' Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality. [[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Robin Fewster|Robin Fewster]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here]&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=252499</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=252499"/>
				<updated>2019-06-20T12:24:44Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: archived June 2019 event&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
'''Next Event:'''&lt;br /&gt;
&lt;br /&gt;
Next event planned for September 2019.&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://groups.google.com/a/owasp.org/forum/#!forum/newcastle-chapter chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle] and/or [https://owasp.slack.com/messages/C0CLHS45S Slack].  &lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
'''2019 Dates'''&lt;br /&gt;
----13/06/2019 from 18:00 to 21:00 at Eagle Lab Newcastle, Tus Park&lt;br /&gt;
&lt;br /&gt;
Red Team versus Blue Team event&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Red Teaming a view from the field'''&lt;br /&gt;
&lt;br /&gt;
Speakers: Andi Pannell (&amp;lt;nowiki&amp;gt;https://twitter.com/dr0idandy&amp;lt;/nowiki&amp;gt;) , Robin Fewster (&amp;lt;nowiki&amp;gt;https://twitter.com/listenerstation&amp;lt;/nowiki&amp;gt;), Gavin Johnson-Lynn (&amp;lt;nowiki&amp;gt;https://twitter.com/gav_jl&amp;lt;/nowiki&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
Description: A talk about what red teaming is, how it is different from a penetration test, and then we’ll reveal some hardware we use during red team engagements and some success stories.&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Protecting the museum – HIPS'''&lt;br /&gt;
Speaker: Marek Banas&lt;br /&gt;
Description: How you can minimise the manual labour with increasing the security on legacy servers, plus some issues we hit while choosing the solutions, challenges we had.&lt;br /&gt;
&lt;br /&gt;
Event is detailed here: [https://www.meetup.com/OWASP-Newcastle-Chapter/events/260856686/ OWASP Newcastle Meetup June 2019]&lt;br /&gt;
----26/02/2019 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-403.&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Matt Wixey (@darkartlab)'''&lt;br /&gt;
&lt;br /&gt;
The talk will be three smaller talks, covering: &lt;br /&gt;
# Remote online social engineering (how attackers use catfishing techniques) &lt;br /&gt;
# Hacking with light and sound (using infrared, ultrasound, and lasers to exfiltrate data and disrupt sensors) &lt;br /&gt;
# Attack linkage (using granular attack behaviours to link different cyber attacks)&lt;br /&gt;
'''Talk 2: Kathryn Cardose (@AGeordieLass)'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Getting stakeholders on board&amp;quot;.&lt;br /&gt;
* So you’ve nailed the tech, you’ve found the controls, you’ve requested remediation.....how do you get stakeholders of all levels to buy in and support security?&lt;br /&gt;
----'''2018 Dates'''&lt;br /&gt;
----25/09/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andy Ferguson: &amp;quot;Don't tell your Big Brother&amp;quot; Encryption tips and tricks.'''   &lt;br /&gt;
* '''Gavin Johnson-Lynn: My Path to CSSLP.''' Join me on a journey from a vague knowledge of security to gaining a valued security certification. For anyone considering certification as a route to success, self-improvement, or even just some thoughts on how I approached it. We’ll look at what I learned and how I learned it, including some tricks I picked up along the way to help cram information into my brain (and keep it there).  &lt;br /&gt;
The event is detailed here: https://www.eventbrite.com/e/owasp-newcastle-september-2018-meetup-tickets-49842084015&lt;br /&gt;
----26/06/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
We held our first CTF (Capture The Flag) event.&lt;br /&gt;
&lt;br /&gt;
The CTF event was facilitated by Secarma. The attendees were split into groups, each group had their own sandboxed environment to connect into, and prizes were offered to the teams who captured the most flags. The event is detailed here: [https://www.eventbrite.com/e/owasp-newcastle-june-2018-capture-the-flag-tickets-43192186994?aff=eac2 https://www.eventbrite.com/e/owasp-newcastle-june-2018-capture-the-flag-tickets-43192186994]&lt;br /&gt;
----27/03/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Andi Pannell: The Internet of (broken) things.''' This talk will focus on the internet of things, how we’re connecting everything to the internet now, because why not add a WiFi connection to your Fridge? And how security is unlikely to be a consideration when making these products. I’ll also talk about DefCon, as last year my company sent a team of us to DefCon 25 in Las Vegas, explaining what DefCon is, what happens there, and how we won the IoT Village 0-day contest and I'll conclude with a '''live hacking demo'''.&lt;br /&gt;
* '''Colin Watson: An introduction to the OWASP automated threats to web applications.''' Web applications are subjected to unwanted automated usage – day in, day out. The vast majority of these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is often mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the attacker’s primary intent. [https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications Project page] | [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Handbook PDF file] | [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-23540699.html Handbook print version] | [https://www.owasp.org/index.php/File:AutomatedThreats-Newcastle-20180327.pptx Newcastle PPT presentation]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/01/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----'''2017 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data. [[Media:Modern_DevOps_and_security.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://www.droidandy.com/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Ben Lee''' and '''Ross Dargan''': '''The problems with proving identity.''' In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers. The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…* (*Talk may not be historically accurate! ;)) [[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
* '''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks.''' The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities. Take a copy of the game away with you - it is suitable for developers of all sizes. [[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
* '''Michael Haselhurst - Automated Security Testing Using The ZAP API.''' This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi. [[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
* '''Mike Goodwin - Real world defence in depth (part 1).''' Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality. [[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Robin Fewster|Robin Fewster]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here]&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=251583</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=251583"/>
				<updated>2019-05-15T08:26:04Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: added June 2019 meetup and archived Feb 2019&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
13/06/2019 from 18:00 to 21:00 at Eagle Lab Newcastle, Tus Park&lt;br /&gt;
&lt;br /&gt;
Red Team versus Blue Team event&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Red Teaming a view from the field'''&lt;br /&gt;
&lt;br /&gt;
Speakers: Andi Pannell (&amp;lt;nowiki&amp;gt;https://twitter.com/dr0idandy&amp;lt;/nowiki&amp;gt;) , Robin Fewster (&amp;lt;nowiki&amp;gt;https://twitter.com/listenerstation&amp;lt;/nowiki&amp;gt;), Gavin Johnson-Lynn (&amp;lt;nowiki&amp;gt;https://twitter.com/gav_jl&amp;lt;/nowiki&amp;gt;)&lt;br /&gt;
&lt;br /&gt;
Description: A talk about what red teaming is, how it is different from a penetration test, and then we’ll reveal some hardware we use during red team engagements and some success stories.&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Protecting the museum – HIPS'''&lt;br /&gt;
Speaker: Marek Banas&lt;br /&gt;
Description: How you can minimise the manual labour with increasing the security on legacy servers, plus some issues we hit while choosing the solutions, challenges we had.&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Tickets&amp;quot; available here: [https://www.meetup.com/OWASP-Newcastle-Chapter/events/260856686/ OWASP Newcastle Meetup June 2019]&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://groups.google.com/a/owasp.org/forum/#!forum/newcastle-chapter chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle] and/or [https://owasp.slack.com/messages/C0CLHS45S Slack].  &lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
'''2019 Dates'''&lt;br /&gt;
&lt;br /&gt;
26/02/2019 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-403.&lt;br /&gt;
&lt;br /&gt;
'''Talk 1: Matt Wixey (@darkartlab)'''&lt;br /&gt;
&lt;br /&gt;
The talk will be three smaller talks, covering: &lt;br /&gt;
# Remote online social engineering (how attackers use catfishing techniques) &lt;br /&gt;
# Hacking with light and sound (using infrared, ultrasound, and lasers to exfiltrate data and disrupt sensors) &lt;br /&gt;
# Attack linkage (using granular attack behaviours to link different cyber attacks)&lt;br /&gt;
'''Talk 2: Kathryn Cardose (@AGeordieLass)'''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Getting stakeholders on board&amp;quot;.&lt;br /&gt;
* So you’ve nailed the tech, you’ve found the controls, you’ve requested remediation.....how do you get stakeholders of all levels to buy in and support security?&lt;br /&gt;
----'''2018 Dates'''&lt;br /&gt;
----25/09/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andy Ferguson: &amp;quot;Don't tell your Big Brother&amp;quot; Encryption tips and tricks.'''   &lt;br /&gt;
* '''Gavin Johnson-Lynn: My Path to CSSLP.''' Join me on a journey from a vague knowledge of security to gaining a valued security certification. For anyone considering certification as a route to success, self-improvement, or even just some thoughts on how I approached it. We’ll look at what I learned and how I learned it, including some tricks I picked up along the way to help cram information into my brain (and keep it there).  &lt;br /&gt;
The event is detailed here: https://www.eventbrite.com/e/owasp-newcastle-september-2018-meetup-tickets-49842084015&lt;br /&gt;
----26/06/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
We held our first CTF (Capture The Flag) event.&lt;br /&gt;
&lt;br /&gt;
The CTF event was facilitated by Secarma. The attendees were split into groups, each group had their own sandboxed environment to connect into, and prizes were offered to the teams who captured the most flags. The event is detailed here: [https://www.eventbrite.com/e/owasp-newcastle-june-2018-capture-the-flag-tickets-43192186994?aff=eac2 https://www.eventbrite.com/e/owasp-newcastle-june-2018-capture-the-flag-tickets-43192186994]&lt;br /&gt;
----27/03/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-402.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Andi Pannell: The Internet of (broken) things.''' This talk will focus on the internet of things, how we’re connecting everything to the internet now, because why not add a WiFi connection to your Fridge? And how security is unlikely to be a consideration when making these products. I’ll also talk about DefCon, as last year my company sent a team of us to DefCon 25 in Las Vegas, explaining what DefCon is, what happens there, and how we won the IoT Village 0-day contest and I'll conclude with a '''live hacking demo'''.&lt;br /&gt;
* '''Colin Watson: An introduction to the OWASP automated threats to web applications.''' Web applications are subjected to unwanted automated usage – day in, day out. The vast majority of these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is often mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the attacker’s primary intent. [https://www.owasp.org/index.php/OWASP_Automated_Threats_to_Web_Applications Project page] | [https://www.owasp.org/index.php/File:Automated-threat-handbook.pdf Handbook PDF file] | [http://www.lulu.com/shop/owasp-foundation/automated-threat-handbook/paperback/product-23540699.html Handbook print version] | [https://www.owasp.org/index.php/File:AutomatedThreats-Newcastle-20180327.pptx Newcastle PPT presentation]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/01/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----'''2017 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data. [[Media:Modern_DevOps_and_security.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://www.droidandy.com/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Ben Lee''' and '''Ross Dargan''': '''The problems with proving identity.''' In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers. The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…* (*Talk may not be historically accurate! ;)) [[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
* '''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks.''' The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities. Take a copy of the game away with you - it is suitable for developers of all sizes. [[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
* '''Michael Haselhurst - Automated Security Testing Using The ZAP API.''' This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi. [[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
* '''Mike Goodwin - Real world defence in depth (part 1).''' Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality. [[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Robin Fewster|Robin Fewster]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here]&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237883</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237883"/>
				<updated>2018-02-19T19:35:00Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: fixed url for old my slides&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Our next event will be held on 27th March 2018. 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.  &lt;br /&gt;
&lt;br /&gt;
''Talk 1: Andi Pannell''&lt;br /&gt;
&lt;br /&gt;
''The Internet of (broken) Things''&lt;br /&gt;
&lt;br /&gt;
Talk: This talk will focus on the internet of things, how we’re connecting everything to the internet now, because why not add a WiFi connection to your Fridge? And how security is unlikely to be a consideration when making these products. I’ll also talk about DefCon, as last year my company sent a team of us to DefCon 25 in Las Vegas, explaining what DefCon is, what happens there, and how we won the IoT Village 0-day contest and I'll conclude with a '''live hacking demo'''.&lt;br /&gt;
&lt;br /&gt;
''Talk 2: Colin Watson''&lt;br /&gt;
&lt;br /&gt;
''An introduction to The OWASP Automated Threats to Web Applications''&lt;br /&gt;
&lt;br /&gt;
Talk: Web applications are subjected to unwanted automated usage – day in, day out. The vast majority of these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is often mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the attacker’s primary intent.&lt;br /&gt;
&lt;br /&gt;
This OWASP project researched these aspects in 2015 and created a new ontology of web application automation threats, and has been updated twice since with the most recent release in February 2018. This presentation will describe the need, how the threats were classified and names defined, and how they information can be used in the real world developing and operating web applications. Attendees to the OWASP Newcastle event will receive a printed copy of the handbook; the PDF handbook and all other outputs are free to download from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
'''2018 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/01/2018 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE01-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----'''2017 Dates'''&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data. [[Media:Modern_DevOps_and_security.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://www.droidandy.com/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Ben Lee''' and '''Ross Dargan''': '''The problems with proving identity.''' In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers. The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…* (*Talk may not be historically accurate! ;)) [[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
* '''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks.''' The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities. Take a copy of the game away with you - it is suitable for developers of all sizes. [[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
* '''Michael Haselhurst - Automated Security Testing Using The ZAP API.''' This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi. [[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
* '''Mike Goodwin - Real world defence in depth (part 1).''' Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality. [[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Robin Fewster|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here]&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237536</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237536"/>
				<updated>2018-02-14T13:26:00Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: march 2018 meeting update&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Our next event will be held on 27th March 2018. 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.  &lt;br /&gt;
&lt;br /&gt;
''Talk 1: Andi Pannell''&lt;br /&gt;
&lt;br /&gt;
''The Internet of (broken) Things''&lt;br /&gt;
&lt;br /&gt;
Talk: This talk will focus on the internet of things, how we’re connecting everything to the internet now, because why not add a WiFi connection to your Fridge? And how security is unlikely to be a consideration when making these products. I’ll also talk about DefCon, as last year my company sent a team of us to DefCon 25 in Las Vegas, explaining what DefCon is, what happens there, and how we won the IoT Village 0-day contest and I'll conclude with a '''live hacking demo'''.&lt;br /&gt;
&lt;br /&gt;
''Talk 2: Colin Watson''&lt;br /&gt;
&lt;br /&gt;
''An introduction to The OWASP Automated Threats to Web Applications''&lt;br /&gt;
&lt;br /&gt;
Talk: Web applications are subjected to unwanted automated usage – day in, day out. The vast majority of these events relate to misuse of inherent valid functionality, rather than the attempted exploitation of unmitigated vulnerabilities. Also, excessive misuse is often mistakenly reported as application denial-of-service (DoS) like HTTP-flooding, when in fact the DoS is a side-effect instead of the attacker’s primary intent.&lt;br /&gt;
&lt;br /&gt;
This OWASP project researched these aspects in 2015 and created a new ontology of web application automation threats, and has been updated twice since with the most recent release in February 2018. This presentation will describe the need, how the threats were classified and names defined, and how they information can be used in the real world developing and operating web applications. Attendees to the OWASP Newcastle event will receive a printed copy of the handbook; the PDF handbook and all other outputs are free to download from the OWASP website.&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''&amp;lt;nowiki/&amp;gt;. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data. [[Media:Modern_DevOps_and_security.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2018 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/11/2018 from 18:00 to 21:00 at  Northumbria University, City Campus East, room CCE01-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here]&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237196</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237196"/>
				<updated>2018-01-31T21:34:27Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Next event to be announced soon. &lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''&amp;lt;nowiki/&amp;gt;. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2018 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/11/2018 from 18:00 to 21:00 at  Northumbria University, City Campus East, room CCE01-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here]&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237195</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237195"/>
				<updated>2018-01-31T21:33:50Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: added slack channel&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Slack =&lt;br /&gt;
OWASP Newcastle has a slack group which you're welcome to join and chat to us! You can join us [https://owasp.slack.com/messages/C0CLHS45S Here] &lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Next event to be announced soon. &lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''&amp;lt;nowiki/&amp;gt;. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2018 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/11/2018 from 18:00 to 21:00 at  Northumbria University, City Campus East, room CCE01-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237194</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=237194"/>
				<updated>2018-01-31T21:27:52Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: archive of Jan 2018&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Next event to be announced soon. &lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''&amp;lt;nowiki/&amp;gt;. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2018 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
30/11/2018 from 18:00 to 21:00 at  Northumbria University, City Campus East, room CCE01-008.&lt;br /&gt;
&lt;br /&gt;
Speakers&lt;br /&gt;
* '''Neil Dixley: Code that fights back.''' Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
* '''Luke Sadler: Practical demonstration of mobile software penetration'''. Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=236816</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=236816"/>
				<updated>2018-01-15T20:16:38Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: january 2018 event&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Our first meeting of 2018 will be held on 30 January 2018. Northumbria Law Building room CCE01-008. &lt;br /&gt;
&lt;br /&gt;
''Talk 1: Neil Dixley'' &lt;br /&gt;
&lt;br /&gt;
''Code that fights back''&lt;br /&gt;
&lt;br /&gt;
Talk: Lessons from the gaming world on detecting and responding to attacks on software assets. An introduction to proactive software security including a philosophical look at how far we should go to protect our apps.&lt;br /&gt;
&lt;br /&gt;
''Talk 2: Luke Sadler''&lt;br /&gt;
&lt;br /&gt;
''Practical demonstration of mobile software penetration''&lt;br /&gt;
&lt;br /&gt;
Talk: Luke Sadler walks us through hands on examples of cracking mobile technology.&lt;br /&gt;
&lt;br /&gt;
Tickets are available https://www.eventbrite.com/e/owasp-newcastle-january-2018-meetup-tickets-42204092577&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.''' [[Media: OWASP_Honeypots.odp]]  &lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.''' [[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' An introduction to penetration testing, using several OWASP projects as well as other open source and free programs. [[Media: An_introduction_to_penetration_testing.pptx]] &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises. [[Media: Threat_Modeling_Presentation.pptx]] &lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
19/09/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
* '''Gareth Dixon: Running a security event using OWASP Security Shepherd.''' In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
* '''Mike Goodwin: Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon'''&amp;lt;nowiki/&amp;gt;. Threat modelling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
21/11/2017 from 18:00 to 21:00 at Northumbria University, City Campus East, room CCE1-024.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Lorenzo Grespan: Explain hacking in ten minutes.''' Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology. Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users. [[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
* '''Robin Sillem:''' '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=236580</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=236580"/>
				<updated>2018-01-03T23:07:20Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: uploaded Lorenzo Talk November 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will be held on 21st November Northumbria City Campus East, room CCE1-024 18:00 - 21:00.&lt;br /&gt;
&lt;br /&gt;
If you plan to attend please register via Eventbrite [https://www.eventbrite.com/e/owasp-newcastle-november-2017-meetup-tickets-39611579300 here]. Registration is not essential although it does help us to estimate the pizza order!&lt;br /&gt;
&lt;br /&gt;
First talk by '''Lorenzo Grespan''' he will be talking about '''Explain hacking in ten minutes''':&lt;br /&gt;
&lt;br /&gt;
Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology.&lt;br /&gt;
&lt;br /&gt;
Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users.&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASPNCL LG 21112017.pdf]]&lt;br /&gt;
&lt;br /&gt;
Pizza and networking&lt;br /&gt;
&lt;br /&gt;
Talk 2: '''Robin Sillem''' has a talk entitled '''Building a Development Environment That's 'Secure Enough'.''' This will be a discussion of how a team at DWP is using modern DevOps practices to create a dev/build/test platform secure enough for development of services handling large volumes of UK citizen data.&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf |Media: CSP_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
''Running a security event using OWASP Security Shepherd''&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Mike Goodwin'''&lt;br /&gt;
&lt;br /&gt;
''Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon''&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter events and corporate sponsorship officer [mailto:katy.l.buller@pwc.com Katy Buller].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASPNCL_LG_21112017.pdf&amp;diff=236579</id>
		<title>File:OWASPNCL LG 21112017.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASPNCL_LG_21112017.pdf&amp;diff=236579"/>
				<updated>2018-01-03T23:04:37Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Lorenzo Talk Newcastle November 2017&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=234653</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=234653"/>
				<updated>2017-10-26T09:59:52Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will be held on 21st November Northumbria City Campus East, room CCE1-024 18:00 - 21:00.&lt;br /&gt;
&lt;br /&gt;
First talk by '''Lorenzo Grespan''' he will be talking about '''Explain hacking in ten minutes''':&lt;br /&gt;
&lt;br /&gt;
Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology.&lt;br /&gt;
&lt;br /&gt;
Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users.&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
''Running a security event using OWASP Security Shepherd''&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Mike Goodwin'''&lt;br /&gt;
&lt;br /&gt;
''Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon''&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=234652</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=234652"/>
				<updated>2017-10-26T09:58:44Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: updated Lorenzo's talk for 21/11/2017&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
The next meeting will be held on 21st November Northumbria City Campus East, room CCE1-024 18:00 - 21:00.&lt;br /&gt;
&lt;br /&gt;
First talk by '''Lorenzo Grespan''' he will by talking about '''Explain hacking in ten minutes''':&lt;br /&gt;
&lt;br /&gt;
Bio: Lorenzo Grespan is a computer scientist currently working as an application security specialist for Secarma, Ltd. While his main interest has always been computer security, he also worked as a developer, systems administrator and project manager for a research effort in robotic surgery. His background is in computational neuroscience, neural networks and evolutionary systems and he likes to solve interesting problems at the intersection of people and technology.&lt;br /&gt;
&lt;br /&gt;
Talk (30 minutes): Recently I had to show a 10-minute  &amp;quot;live hack&amp;quot; to a non-technical audience. As an introvert and a geek my main effort was in maintaining technical accuracy, however what made the audience go &amp;quot;aha!&amp;quot; turned out to be what for me was the least significant detail of the entire demo. In this talk I will show the hack, share the lessons learned and discuss how to communicate security concerns to non technical stakeholders, higher management and end users.&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
''Running a security event using OWASP Security Shepherd''&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Mike Goodwin'''&lt;br /&gt;
&lt;br /&gt;
''Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon''&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=233737</id>
		<title>Newcastle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Newcastle&amp;diff=233737"/>
				<updated>2017-09-25T16:32:00Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: added Andi Pannell to chapter leaders&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Newcastle|extra=The chapter leaders are [mailto:connor.carr@owasp.org Connor Carr], [mailto:robin.fewster@owasp.org Robin Fewster], [mailto:mike.goodwin@owasp.org Mike Goodwin,] and [mailto:andrew.pannell@owasp.org Andi Pannell]&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Newcastle|emailarchives=http://lists.owasp.org/pipermail/owasp-newcastle}}&lt;br /&gt;
&lt;br /&gt;
= Next Meeting  =&lt;br /&gt;
&lt;br /&gt;
TBC - watch this space! Expected December 2017 or January 2018.&lt;br /&gt;
&lt;br /&gt;
= Upcoming Events  =&lt;br /&gt;
&lt;br /&gt;
Keep updated and in touch using the [https://lists.owasp.org/mailman/listinfo/owasp-Newcastle chapter mailing list] and/or Twitter [https://twitter.com/OWASP_Newcastle @OWASP_Newcastle]&lt;br /&gt;
&lt;br /&gt;
= Past Events  =&lt;br /&gt;
&lt;br /&gt;
'''2015 Dates'''&lt;br /&gt;
&lt;br /&gt;
24/11/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
The long talk by '''Ben Lee''' and '''Ross Dargan''':&lt;br /&gt;
&lt;br /&gt;
'''The problems with proving identity.'''&lt;br /&gt;
&lt;br /&gt;
In this talk Ross  (@rossdargan) and Ben (@bibbleq) will discuss the conundrum of proving (and more importantly verifying!) identity online. While both of these tasks might seem simple at first, they really aren't. This is a problem that people have grappled with since the beginning of communications (okay so not the online part!) and we still don't have all the answers.&lt;br /&gt;
&lt;br /&gt;
The talk will cover among other things; Twitter, wax seals (!), hashing, certificates and much more…*&lt;br /&gt;
&lt;br /&gt;
(*Talk may not be historically accurate! ;))&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_the_problem_with_proving_identity.pptx]]&lt;br /&gt;
&lt;br /&gt;
The short talks:&lt;br /&gt;
&lt;br /&gt;
'''Colin Watson - Think about the Top 10 Controls, not the Top 10 Risks'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Top 10 is the most well-known OWASP project, but how can awareness of OWASP guidance for developers be improved? In this presentation Colin Watson will describe a board game that encourages developers to think and learn about the most important web application security controls, rather than risks or vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
Take a copy of the game away with you - it is suitable for developers of all sizes.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-snakesandladders.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Michael Haselhurst - Automated Security Testing Using The ZAP API'''&lt;br /&gt;
&lt;br /&gt;
This talk will show you how to integrate the OWASP ZAP API with automated test scripts using Sahi.&lt;br /&gt;
&lt;br /&gt;
[[Media: OWASPNewcastle_automated_security_testing_using_ZAP_API.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Mike Goodwin - Real world defence in depth (part 1)'''&lt;br /&gt;
&lt;br /&gt;
Everyone should be aiming for defence in depth, but what does it actually mean to an application developer? This is the first of a series of short talks about real world scenarios where defence in depth is genuinely useful and easily achievable. It should help you turn defence in depth from an aspiration into practical reality.&lt;br /&gt;
&lt;br /&gt;
[[Media: Owaspnewcastle-real_world_defence_in_depth.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/09/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002&lt;br /&gt;
&lt;br /&gt;
We changed the format for this meeting and has 3 short talks (approx 20 mins) and then one long one (60 mins).&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
&lt;br /&gt;
* '''John Beddard''' on Securing Real-Time Networks (short talk) [[Media: PassiveDefense_Newcastle_Chapter_Sept_2015.pdf]]&lt;br /&gt;
* '''Ian Oxley''' on Content Security Policy (short talk) [[Media: CSP_Newcastle_Chapter_Sept_2015.pdf ]]&lt;br /&gt;
* '''Mike Goodwin''' on Threat Dragon - a new threat modelling tool project from OWASP (short talk) [[Media: OWASP_Threat_Dragon_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
* '''Neil Dixley''' on 'OWASP Top 10 Mobile Risks' (long talk) [[Media: OWASP_Mobile_Security_Project_Newcastle_Chapter_Sept_2015.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
28/07/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Andrew Waite: Honeypots; from research to the Enterprise.'''  &lt;br /&gt;
[[Media: OWASP_Honeypots.odp]]&lt;br /&gt;
&lt;br /&gt;
* '''George Chlapoutakis: Security in the World of Containerisation.'''&lt;br /&gt;
[[Media: OWASP_Security_Containerisation.ppt]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
29/05/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA102B.&lt;br /&gt;
&lt;br /&gt;
Speakers:&lt;br /&gt;
* '''Robin Fewster: An introduction to basic application penetration testing.''' &lt;br /&gt;
An introduction to penetration testing, using several OWASP projects as well as other open source and free programs.&lt;br /&gt;
[[Media: An_introduction_to_penetration_testing.pptx]]&lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: The Elevation of Privilege Threat Modelling Tool.''' &lt;br /&gt;
An introduction to threat modelling and using the 'Elevation of Privilege' card game to facilitate and improve team threat modelling exercises.&lt;br /&gt;
[[Media: Threat_Modeling_Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
24/03/2015 from 18:00 to 21:00 at Northumbria University Ellison Building EBA002.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Neil Dixley: Cognitive Bias and Security Vulnerabilities: The psychology of software engineering.''' An introduction to the psychology of cognitive bias and how human nature and cognitive biases are the key to user based security vulnerabilities. A look at how our brains trick us into feeling safe while giving our pin number to strangers on the phone plus a look at how we can use technology to disrupt cognitive bias and use these human traits to mitigate threats and strengthen application security. [[Media:Cognitive_Bias_and_Security_Vulnerabilities__Presentation.pptx]]&lt;br /&gt;
* '''Andy Ward: Security Compliance for Developers - Are we Certified... or Certifiable?.''' Against a background of increasing threats and hacks, with more and more of our personal lives and business processes conducted online, it's never been more important to ensure our software is secure and robust. But how do you prove it? These days, reassuring your customers takes more than an SSL padlock, and some marketing spiel mentioning 'banking grade encryption'! After a quick reminder of &amp;quot;what's the worst that can happen...&amp;quot;, Andy will introduce some of the security Compliance and Certification systems that help you 'walk the walk', and provide confidence that your system has its security in good hands, before looking at what it means for developers and engineering teams. [[Media: OWASP_Compliance_for_Devs.pptx]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''2016 Dates'''&lt;br /&gt;
&lt;br /&gt;
23/08/2016 from 18:00 to 21:00 at The Auditorium - Bunker Coffee and Kitchen 9-11 Carliol Square, Newcastle-upon-Tyne, NE1 6UF.&lt;br /&gt;
&lt;br /&gt;
Speakers: &lt;br /&gt;
&lt;br /&gt;
* '''Andrew Pannell: 50 Million Downloads and All I Got Was Malware.''' How is it a free Android application that has been downloaded more times than WhatsApp can turn your phone into malware, sending your private data to China and inserting adverts? I’ll be discussing my journey of researching mobile malware and how you can too. [https://rm-r.sh/uploads/50MillionDownloads.pdf]&lt;br /&gt;
* '''Colin Watson: OWASP Cornucopia.''' OWASP Cornucopia is a free open-source card game, referenced by a PCI DSS information supplement, that helps derive application security requirements during the software development life cycle. This session will use an example eCommerce application to demonstrate how to utilise the card game. After an introduction and explanation, we will split into smaller groups to play the game gaining insights into relevant web application threats. The game is best played in groups of 4-6 with people who have a good knowledge of the application being assessed, and who have a mixture of backgrounds/experience - architects, developers, product owners, project managers, testers, etc, and those with software security responsibilities. Bring your colleagues along. Cornucopia is suitable for people aged 10 to 110 (decimal). [https://www.owasp.org/index.php/File:OwaspNCL-cornucopia-colinwatson.odp]&lt;br /&gt;
&lt;br /&gt;
'''2017 Dates'''&lt;br /&gt;
&lt;br /&gt;
''Running a security event using OWASP Security Shepherd''&lt;br /&gt;
&lt;br /&gt;
In this talk I will cover running a security event using [[OWASP Security Shepherd]]. The event to be discussed was staged to promote engagement in a security initiative, understanding of security vulnerabilities and the application of knowledge to production services and applications. This talk will cover the project planning stage, through execution to the project retrospective. [[Media:Security_Shepherd.pptx]]&lt;br /&gt;
&lt;br /&gt;
'''Talk 2: Mike Goodwin'''&lt;br /&gt;
&lt;br /&gt;
''Enter the (Threat ) Dragon:Threat Modeling with OWASP Threat Dragon''&lt;br /&gt;
&lt;br /&gt;
Threat modeling is a great technique for hardening your application designs, but current tooling is a bit &amp;quot;crashy&amp;quot;, limited to Windows or not free. [[OWASP Threat Dragon]] is an OWASP incubator project that aims to fix this and bring threat modeling to the masses. This talk is a tour round the tool, it's future road map and a look under it's hood. Mike the the project leader for Threat Dragon, so if you want to contribute, he would be very pleased to speak to you. [[Media:Owasp_threat_dragon_201709_.pptx]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leaders  =&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are:&lt;br /&gt;
&lt;br /&gt;
* [[User:Connor Carr|Connor Carr]]&lt;br /&gt;
* [[User:Listenerstation|Robin Fewster]]&lt;br /&gt;
* [[User:Michael Goodwin|Mike Goodwin]]&lt;br /&gt;
* [[User:Andi Pannell|Andi Pannell]]&lt;br /&gt;
&lt;br /&gt;
We are always happy to hear from people who want to contribute to the chapter as a leader.&lt;br /&gt;
&lt;br /&gt;
= Sponsorship = &lt;br /&gt;
&lt;br /&gt;
The Newcastle chapter is very grateful to Sage (platinum sponsor) for its generous support.&lt;br /&gt;
&lt;br /&gt;
[[File:sage-logo.jpg]]&lt;br /&gt;
&lt;br /&gt;
Chapter sponsorship helps pay for venue hire, pizzas, speaker travel expenses, pizzas, giveaway swag for meetings and pizzas.  Also, a proportion of the sponsorship goes to support the OWASP global mission. If you would like to sponsor the chapter, please contact one of the chapter leaders. The corporate sponsorship costs are:&lt;br /&gt;
&lt;br /&gt;
* Platinum sponsor (£1200)&lt;br /&gt;
* Gold sponsor (£600)&lt;br /&gt;
* Silver sponsor (£300)&lt;br /&gt;
&lt;br /&gt;
Any other donation is also gratefully received.&lt;br /&gt;
&lt;br /&gt;
= Local Organisations  =&lt;br /&gt;
&lt;br /&gt;
Other related organisations in the Newcastle area:&lt;br /&gt;
&lt;br /&gt;
* '''(ISC)2 North East Chapter''' - for information, contact the chapter secretary, [mailto:robin.fewster@sage.com Robin Fewster], the chapter president [mailto:ken.walls@rpmi.co.uk Ken Walls], the chapter membership officer [mailto:scott.wakeling@atos.net Scott Wakeling] or the chapter treasurer [mailto:gleishman@secnetics.com Gordon Leishman].&lt;br /&gt;
&lt;br /&gt;
Please get in touch with one of the OWASP Newcastle chapter leaders to get your organisation listed here.&lt;br /&gt;
&lt;br /&gt;
And feel free to use the [https://lists.owasp.org/mailman/listinfo/owasp-newcastle Newcastle mailing list] to publicise related events (this list is moderated).&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Andi_Pannell&amp;diff=233736</id>
		<title>User:Andi Pannell</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Andi_Pannell&amp;diff=233736"/>
				<updated>2017-09-25T16:26:30Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: added main details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;I've worked in security professionally since 2014, after graduating from Northumbria University with an Ethical Hacking degree. I am currently working as a Penetration Tester at a security consultancy and based in the North East. I head up the Android mobile security service and I am a regular speaker and attendee of various security conferences worldwide.&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_Ten_Contributions&amp;diff=219177</id>
		<title>Mobile Top Ten Contributions</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_Ten_Contributions&amp;diff=219177"/>
				<updated>2016-07-21T10:32:37Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: /* Wiki Content */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is a work in progress. If we have omitted you, or incorrectly affiliated you, please contact us right away.&lt;br /&gt;
&lt;br /&gt;
== Project Leads ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:jason.haddix@owasp.org Jason Haddix - HP Fortify]&lt;br /&gt;
* [mailto:daniel.meissler@owasp.org Daniel Miessler - HP Fortify]&lt;br /&gt;
* [mailto:jonthan.carter@owasp.org Jonathan Carter - Arxan Technologies]&lt;br /&gt;
*[mailto:milan@owasp.org Milan Singh Thakur]&lt;br /&gt;
&lt;br /&gt;
== Strategic Roadmap ==&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP Mobile Top Ten 2015 - Strategy.pdf|Strategy Document]]&lt;br /&gt;
&lt;br /&gt;
== Wiki Content ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:chad.butler@owasp.org Chad Butler - Concur Technologies]&lt;br /&gt;
* [mailto:jonathan.carter@owasp.org Jonathan Carter - Arxan Technologies]&lt;br /&gt;
* Ron Gutierrez - Gotham Digital Science&lt;br /&gt;
* [mailto:jason.haddix@owasp.org Jason Haddix - HP Fortify]&lt;br /&gt;
* [mailto:paco@owasp.org Paco Hope - Cigital]&lt;br /&gt;
* Zach Lanier&lt;br /&gt;
* [mailto:daniel.meissler@owasp.org Daniel Miessler - HP Fortify]&lt;br /&gt;
* [mailto:andrew.pannell@owasp.org Andrew Pannell - Pentest Limited]&lt;br /&gt;
* Rahil Parikh - Gotham Digital Science&lt;br /&gt;
* Mike Zuzman&lt;br /&gt;
*[mailto:milan@owasp.org Milan Singh Thakur]&lt;br /&gt;
&lt;br /&gt;
== Data Contributors ==&lt;br /&gt;
&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.html HP Fortify]&lt;br /&gt;
* [https://twitter.com/andresitoath Andreas Athanasoulias &amp;amp; Syntax IT]&lt;br /&gt;
* [http://www.espheresecurity.com/ Hemil Shah and eSphere Security]&lt;br /&gt;
* [http://www.riis.com/ Godfrey Nolan and RIIS (Research Into Internet Systems)]&lt;br /&gt;
* [http://www.arxan.com/ Arxan Technologies]&lt;br /&gt;
* [http://www.cigital.com/ Cigital]&lt;br /&gt;
* [http://www.bugcrowd.com/ Bugcrowd]&lt;br /&gt;
* [http://www.hacklabs.com/ Hacklabs]&lt;br /&gt;
* [http://www.ibm.com/security/xforce/ IBM X-Force Threat Intelligence]&lt;br /&gt;
* [http://www.krvw.com/ KRVW Associates]&lt;br /&gt;
* [http://www.metaintelli.com/ MetaIntelli]&lt;br /&gt;
* [http://www.purehacking.com/ Pure Hacking]&lt;br /&gt;
* [http://www.securenetwork.it/ Secure Network]&lt;br /&gt;
*[https://aujas.com/ Aujas Networks]&lt;br /&gt;
&lt;br /&gt;
== Data ==&lt;br /&gt;
&lt;br /&gt;
The 2015 data sets are stored at the below link:&lt;br /&gt;
&lt;br /&gt;
[https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0 https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0]&lt;br /&gt;
&lt;br /&gt;
== Synthesis ==&lt;br /&gt;
&lt;br /&gt;
Key observations and trends from the data can be found in here:&lt;br /&gt;
&lt;br /&gt;
* [[Media:OWASP Mobile Top Ten 2015 - Final Synthesis.pdf|Synthesis Document]]&lt;br /&gt;
&lt;br /&gt;
== Additional Thanks ==&lt;br /&gt;
&lt;br /&gt;
* Jim Manico&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Project&amp;diff=193724</id>
		<title>OWASP Mobile Security Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Mobile_Security_Project&amp;diff=193724"/>
				<updated>2015-04-20T14:26:13Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: /* Contributors */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Home =&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:90px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File: lab_big.jpg|link=OWASP_Project_Stages#tab.3DLab_Projects]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== OWASP Mobile Security Project ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Mobile Security Project is a centralized resource intended to give developers and security teams the resources they need to build and maintain secure mobile applications.  Through the project, our goal is to classify mobile security risks and provide developmental controls to reduce their impact or likelihood of exploitation.&lt;br /&gt;
&lt;br /&gt;
Our primary focus is at the application layer.  While we take into consideration the underlying mobile platform and carrier inherent risks when threat modeling and building controls, we are targeting the areas that the average developer can make a difference.  Additionally, we focus not only on the mobile applications deployed to end user devices, but also on the broader server-side infrastructure which the mobile apps communicate with.  We focus heavily on the integration between the mobile application, remote authentication services, and cloud platform-specific features.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''We have a Google Doc where anyone who wants to be involved with the project can add their thoughts, suggestions, and take ownership of initiatives - [https://docs.google.com/document/d/1bScrvrLJLOHcSbztjBxYoN-jN3kR8bViy9tF8Nx0c08/edit Click here]. There are various tasks that people have started over the past 6 months with varying levels of quality and completeness.'''&lt;br /&gt;
&lt;br /&gt;
This project is still a work in progress. We are small group doing this work and could use more help! If you are interested, please contact one of the project leads or feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well! &lt;br /&gt;
&lt;br /&gt;
| valign=&amp;quot;top&amp;quot;  style=&amp;quot;padding-left:25px;width:200px;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
== Email List ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Asvs-bulb.jpg]] [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks Project Email List]&lt;br /&gt;
&lt;br /&gt;
== Project Leaders ==&lt;br /&gt;
{{Template:Contact | name = Mike Zusman&lt;br /&gt;
| email = mike.zusman@owasp.org&lt;br /&gt;
| username = schmoilito }}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Tony DeLaGrange&lt;br /&gt;
| email = mobisec@secureideas.net&lt;br /&gt;
| username = Tony DeLaGrange&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Sarath Geethakumar&lt;br /&gt;
| email = sarath.geethakumar@owasp.org&lt;br /&gt;
| username =  Sarath Geethakumar&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Tom Eston&lt;br /&gt;
| email = teston@securestate.com&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Don Williams&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Jason Haddix&lt;br /&gt;
| email = jason.haddix@hp.com&lt;br /&gt;
| username =  Jason Haddix&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Contributors ==&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Zach Lanier&lt;br /&gt;
| email = zach.lanier@n0where.org&lt;br /&gt;
| username = Zach_Lanier&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Jim Manico&lt;br /&gt;
| email = jim.manico@owasp.org&lt;br /&gt;
| username = jmanico&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Ludovic Petit&lt;br /&gt;
| email = ludovic.petit@owasp.org&lt;br /&gt;
| username =  Ludovic Petit&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Swapnil Deshmukh&lt;br /&gt;
| email = sd.swapz@gmail.com&lt;br /&gt;
| username =  Swapnil Deshmukh&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Beau Woods&lt;br /&gt;
| email = owasp@beauwoods.com&lt;br /&gt;
| username =  Beau Woods&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Jonathan Carter&lt;br /&gt;
| email = jonathan.carter@owasp.org&lt;br /&gt;
| username =  Jonathan Carter&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = David Martin Aaron&lt;br /&gt;
| email = davidmartinaaron@gmail.com&lt;br /&gt;
| username =  David Martin Aaron&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Luca De Fulgentis&lt;br /&gt;
| email = luca@securenetwork.it&lt;br /&gt;
| username =  Daath&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Milan Singh Thakur&lt;br /&gt;
| email = milanthakur2010@gmail.com&lt;br /&gt;
| username =  Milan Singh Thakur&lt;br /&gt;
}}&amp;lt;br/&amp;gt;&lt;br /&gt;
{{Template:Contact&lt;br /&gt;
| name = Andrew Pannell&lt;br /&gt;
| email = andrew.pannell@owasp.org&lt;br /&gt;
| username =  Andipannell&lt;br /&gt;
}}&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
= Top 10 Mobile Risks =&lt;br /&gt;
&lt;br /&gt;
Please visit the [https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks project page] for current information. &lt;br /&gt;
&lt;br /&gt;
== About this list  ==&lt;br /&gt;
In 2013, we polled the industry for new vulnerability statistics in the field of mobile applications. What you see here is a result of that data and a representation of the mobile application threat landscape. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Our goals for the 2014 list included the following:&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
* Updates to the wiki content; including cross-linking to testing guides, more visual exercises, etc;&lt;br /&gt;
* Generation of more data; and&lt;br /&gt;
* A PDF release.&lt;br /&gt;
&lt;br /&gt;
This list has been finalized after a 90-day feedback period from the community. Based on feedback, we intend on releasing a Mobile Top Ten 2015 list following a similar approach of collecting data, grouping the data in logical and consistent ways.&lt;br /&gt;
&lt;br /&gt;
Feel free to visit [https://groups.google.com/a/owasp.org/forum/#!forum/owasp-mobile-top-10-risks the mailing list] as well! &lt;br /&gt;
&lt;br /&gt;
== Call to Action for 2015 ==&lt;br /&gt;
We are currently looking for vendors, consultants, or other industry experts within the appsec community that are willing to participate in the OWASP Mobile Top Ten 2015.  Participation could include any of the following: gathering data, promoting awareness, etc.&lt;br /&gt;
&lt;br /&gt;
We have published a [https://docs.google.com/viewer?a=v&amp;amp;pid=forums&amp;amp;srcid=MTM2MzA3NTkyMzA4NjgxNjcwNjQBMTU5NDg1NTE3NTg0NTgyOTMzOTgBUmEtcUZEUFNUVzRKATAuMQFvd2FzcC5vcmcBdjI Call for Data document] and have also (in the name of transparency) [https://docs.google.com/spreadsheets/d/16bW_VhEIlFU4cfN8BOOk40-XN93FM0f0Sxcx67NwPcg/edit?usp=sharing published a document] which lists which entities/vendors/individuals/etc that we have reached out to. These requests were made because we know these entities to be thought leaders in the mobile application space. If we missed you, and you have data or feedback to contribute, we apologize. Please email one of us!&lt;br /&gt;
&lt;br /&gt;
== Top 10 Mobile Risks - Final List 2014 ==&lt;br /&gt;
[[File:2014-01-26 20-23-29.png|right|550px]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M1|M1: Weak Server Side Controls ]] &lt;br /&gt;
*[[Mobile_Top_10_2014-M2|M2: Insecure Data Storage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M3|M3: Insufficient Transport Layer Protection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M4|M4: Unintended Data Leakage ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M5|M5: Poor Authorization and Authentication ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M6|M6: Broken Cryptography ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M7|M7: Client Side Injection ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M8|M8: Security Decisions Via Untrusted Inputs ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M9|M9: Improper Session Handling ]]&lt;br /&gt;
*[[Mobile_Top_10_2014-M10|M10: Lack of Binary Protections ]]&lt;br /&gt;
&lt;br /&gt;
== Project Leads, Credit, and Contributions ==&lt;br /&gt;
&lt;br /&gt;
* ''' [[Mobile_Top_Contributions|Mobile Top Ten Contributions Page ]] '''&lt;br /&gt;
&lt;br /&gt;
== Project Methodology ==&lt;br /&gt;
&lt;br /&gt;
* '''We adhered loosely to the [https://www.owasp.org/index.php/Top_10_2013/ProjectMethodology OWASP Web Top Ten Project methodology]. '''&lt;br /&gt;
&lt;br /&gt;
== Archive ==&lt;br /&gt;
* The list below is the OLD release candidate v1.0 of the OWASP Top 10 Mobile Risks. &amp;amp;nbsp;This list was initially released on September 23, 2011 at Appsec USA. &amp;amp;nbsp;&lt;br /&gt;
** The original presentation can be found here:&amp;amp;nbsp;[http://www.slideshare.net/JackMannino/owasp-top-10-mobile-risks SLIDES]&amp;lt;br&amp;gt; &lt;br /&gt;
** The corresponding video can be found here: [http://www.youtube.com/watch?v=GRvegLOrgs0 VIDEO]&lt;br /&gt;
** [[Mobile_Top_10_2012|2011-12 Mobile Top Ten for archive purposes]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Mobile Tools =&lt;br /&gt;
== iMAS  ==&lt;br /&gt;
&lt;br /&gt;
iMAS is a collaborative research project from the MITRE Corporation focused on open source iOS security controls. Today, iOS meets the enterprise security needs of customers, however many security experts cite critical vulnerabilities and have demonstrated exploits, which pushes enterprises to augment iOS deployments with commercial solutions. The iMAS intent is to protect iOS applications and data beyond the Apple provided security model and reduce the adversary’s ability and efficiency to perform recon, exploitation, control and execution on iOS mobile applications. iMAS will transform the effectiveness of the existing iOS security model across major vulnerability areas including the System Passcode, jailbreak, debugger / run-time, flash storage, and the system keychain. Research outcomes include an open source secure application framework, including an application container, developer and validation tools/techniques.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_iMAS_iOS_Mobile_Application_Security_Project iMas Project Page]&lt;br /&gt;
&lt;br /&gt;
The source code for iMAS is available on GitHub: [https://github.com/project-imas/about iMAS Source Code]&lt;br /&gt;
&lt;br /&gt;
== GoatDroid  ==&lt;br /&gt;
&lt;br /&gt;
OWASP GoatDroid is a fully functional and self-contained training environment for educating developers and testers on Android security. GoatDroid requires minimal dependencies and is ideal for both Android beginners as well as more advanced users. The project currently includes two applications: FourGoats, a location-based social network, and Herd Financial, a mobile banking application. There are also several features that greatly simplify usage within a training environment or for absolute beginners who want a good introduction to working with the Android platform.&lt;br /&gt;
&lt;br /&gt;
As the Android SDK introduces new features, the GoatDroid contributors will strive to implement up-to-date lessons that can educate developers and security testers on new security issues. The project currently provides coverage for most of the OWASP Top 10 Mobile Risks and also includes a bunch of other problems as well.&lt;br /&gt;
&lt;br /&gt;
You can find GoatDroid on GitHub: [https://github.com/jackMannino/OWASP-GoatDroid-Project GoatDroid Source Code]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_GoatDroid_Project GoatDroid Project Page]&lt;br /&gt;
&lt;br /&gt;
== iGoat ==&lt;br /&gt;
&lt;br /&gt;
iGoat is a learning tool for iOS developers (iPhone, iPad, etc.). It was inspired by the WebGoat project, and has a similar conceptual flow to it.&lt;br /&gt;
&lt;br /&gt;
As such, iGoat is a safe environment where iOS developers can learn about the major security pitfalls they face as well as how to avoid them. It is made up of a series of lessons that each teach a single (but vital) security lesson.&lt;br /&gt;
&lt;br /&gt;
The lessons are laid out in the following steps:&lt;br /&gt;
&lt;br /&gt;
# Brief introduction to the problem.&lt;br /&gt;
# Verify the problem by exploiting it.&lt;br /&gt;
# Brief description of available remediations to the problem.&lt;br /&gt;
# Fix the problem by correcting and rebuilding the iGoat program.&lt;br /&gt;
&lt;br /&gt;
Step 4 is optional, but highly recommended for all iOS developers. Assistance is available within iGoat if you don't know how to fix a specific problem.&lt;br /&gt;
&lt;br /&gt;
iGoat is free software, released under the GPLv3 license.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_iGoat_Project iGoat Project Page]&lt;br /&gt;
&lt;br /&gt;
The iGoat source code is available on Google Code [http://code.google.com/p/owasp-igoat/ iGoat Source Code]&lt;br /&gt;
&lt;br /&gt;
== Damn Vulnerable iOS Application ==&lt;br /&gt;
&lt;br /&gt;
Damn Vulnerable iOS application is a project started by Prateek Gianchandani which gives mobile testers and developers an iOS application to practice attacking/defending skill sets. Each challenge area corresponds to an in-depth article designed to teach the fundamentals of mobile security on the iOS platform. Some challenge categories include multiple challenge types.&lt;br /&gt;
&lt;br /&gt;
The current challenge categories:&lt;br /&gt;
&lt;br /&gt;
* Insecure Data Storage (4 exercises)&lt;br /&gt;
* Jailbreak Detection (2 exercises)&lt;br /&gt;
* Runtime Manipulation (3 exercises)&lt;br /&gt;
* Transport Layer Security (1 exercise)&lt;br /&gt;
* Client Side Injection (1 exercise)&lt;br /&gt;
* Broken Cryptography (1 exercise)&lt;br /&gt;
* Binary Patching (4 exercises)&lt;br /&gt;
&lt;br /&gt;
[http://damnvulnerableiosapp.com DVIA Home Page]&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_DVIA DVIA OWASP Project Page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/prateek147/DVIA DVIA Github Source]&lt;br /&gt;
&lt;br /&gt;
[http://damnvulnerableiosapp.com/#learn DVIA Learning Resources]&lt;br /&gt;
&lt;br /&gt;
== MobiSec ==&lt;br /&gt;
&lt;br /&gt;
The MobiSec Live Environment Mobile Testing Framework project is a live environment for testing mobile environments, including devices, applications, and supporting infrastructure. The purpose is to provide attackers and defenders the ability to test their mobile environments to identify design weaknesses and vulnerabilities. The MobiSec Live Environment provides a single environment for testers to leverage the best of all available open source mobile testing tools, as well as the ability to install additional tools and platforms, that will aid the penetration tester through the testing process as the environment is structured and organized based on an industry­‐proven testing framework. Using a live environment provides penetration testers the ability to boot the MobiSec Live Environment on any Intel-­based system from a DVD or USB flash drive, or run the test environment within a virtual machine. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_MobiSec Project Page]&lt;br /&gt;
&lt;br /&gt;
MobiSec can be downloaded from Sourceforge: [http://sourceforge.net/p/mobisec/wiki/Home/ MobiSec Download Repository]&lt;br /&gt;
&lt;br /&gt;
== Androick  ==&lt;br /&gt;
&lt;br /&gt;
Androick is a collaborative research project from PHONESEC Ltd. With our tool, you can evaluate some risks on Android mobile applications.&lt;br /&gt;
Androick is a tool that allows any user to analyze an Android application. It can get the apk file, all the datas and the databases in sqlite3 and csv format. &lt;br /&gt;
Only for Pentesters or Researchers.&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Projects/OWASP_Androick_Project Androick Project Page]&lt;br /&gt;
&lt;br /&gt;
== NowSecure App Testing Community Edition ==&lt;br /&gt;
&lt;br /&gt;
The NowSecure App Testing Community Edition is the freely downloadable version of the powerful App Testing suite. Users are offered a number of features such as network capture, automation, import / export, and reporting to test and secure mobile apps.&lt;br /&gt;
&lt;br /&gt;
It provides the opportunity to complete mobile app security tests on any application on Android or iOS mobile devices (or installed in an emulator).&lt;br /&gt;
&lt;br /&gt;
The suite is provided as a preconfigured virtual machine (VM). After downloading the VM and licensing your version of the suite you will have everything you need to test the security of mobile apps.&lt;br /&gt;
&lt;br /&gt;
Built in emulator - Don’t have a device? No worries. The suite includes a built in Emulator that may be used to test the security of your mobile applications.&lt;br /&gt;
&lt;br /&gt;
[https://www.nowsecure.com/apptesting/community/ NowSecure App Testing Suite]&lt;br /&gt;
&lt;br /&gt;
== OWASP Seraphimdroid ==&lt;br /&gt;
OWASP SeraphimDroid is educational, privacy and device protection application for android devices that helps users learn about risks and threats coming from other android applications. SeraphimDroid is also an application firewall for android devices not allowing malicious SMS or MMS to be sent, USSD codes to be executed or calls to be called without user permission and knowledge. &lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/OWASP_SeraphimDroid_Project OWASP Seraphimdroid project page]&lt;br /&gt;
&lt;br /&gt;
[https://github.com/nikolamilosevic86/owasp-seraphimdroid OWASP Seraphimdroid code]&lt;br /&gt;
&lt;br /&gt;
[https://play.google.com/store/apps/details?id=org.owasp.seraphimdroid OWASP Seraphimdroid on Google Play]&lt;br /&gt;
&lt;br /&gt;
== OWASP Summer of Code 2008 ==&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation sponsored the OWASP Application Security Verification Standard Project during the OWASP Summer of Code 2008.&lt;br /&gt;
&lt;br /&gt;
= Mobile Security Testing =&lt;br /&gt;
&lt;br /&gt;
== Introduction ==&lt;br /&gt;
&lt;br /&gt;
A major priority of the OWASP Mobile Security Project is to help standardize and disseminate mobile application testing methodologies. While specific techniques exist for individual platforms, a general mobile threat model can be used to assist test teams in creating a mobile security testing methodology for any platform. The outline which follows describes a general mobile application testing methodology which can be tailored to meet the security tester’s needs. It is high level in some places, and over time will be customized on a per-platform basis.&lt;br /&gt;
&lt;br /&gt;
This guide is targeted towards application developers and security testers. Developers can leverage this guide to ensure that they are not introducing the security flaws described within the guide. Security testers can use it as a reference guide to ensure that they are adequately assessing the mobile application attack surface. The ideal mobile assessment combines dynamic analysis, static analysis, and forensic analysis to ensure that the majority of the mobile application attack surface is covered. &lt;br /&gt;
&lt;br /&gt;
On some platforms, it may be necessary to have root user or elevated privileges in order to perform all of the the required analysis on devices during testing. Many applications write information to areas that cannot be accessed without a higher level of access than the standard shell or application user generally has. For steps that generally require elevated privileges, it will be stated that this is the case. &lt;br /&gt;
&lt;br /&gt;
This guide is broken up into three sections:&lt;br /&gt;
*'''Information Gathering-''' describes the steps and things to consider when you are in the early stage reconnaissance and mapping phases of testing as well as determining the application’s magnitude of effort and scoping.&lt;br /&gt;
*'''Static Analysis'''- Analyzing raw mobile source code, decompiled or disassembled code. &lt;br /&gt;
*'''Dynamic Analysis''' - executing an application either on the device itself or within a simulator/emulator and interacting with the remote services with which the application communicates. This includes assessing the application’s local interprocess communication surface, forensic analysis of the local filesystem, and assessing remote service dependencies.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== How To Use This Resource ===&lt;br /&gt;
&lt;br /&gt;
As this guide is not platform specific, you will need to know the appropriate techniques &amp;amp; tools for your target platform. The OWASP Mobile Security Project has also developed a number of other supporting resources which may be able to be leveraged for your needs.&lt;br /&gt;
&lt;br /&gt;
'''In this current draft release, the guide is a work in progress. We need additional contributors to help fill in the blanks. If you think something is missing (there certainly is), add it.'''&lt;br /&gt;
&lt;br /&gt;
As this guide is not platform specific, you will need to know the appropriate techniques &amp;amp; tools for your target platform. The OWASP Mobile Security Project has also developed a number of other supporting resources which may be able to be leveraged for your needs,&lt;br /&gt;
&lt;br /&gt;
The steps required to properly test an Android application are very different than those of testing an iOS application. Likewise, Windows Phone is very different from the other platforms. Mobile security testing requires a diverse skillset over many differing operating systems and a critical ability to analyze various types of source code.&lt;br /&gt;
&lt;br /&gt;
In many cases, a mobile application assessment will require coverage in all three areas identified within this testing reference. A dynamic assessment will benefit from an initial thorough attempt at Information Gathering, some level of static analysis against the application’s binary, and a forensic review of the data created and modified by the application’s runtime behavior.&lt;br /&gt;
&lt;br /&gt;
Please use this guide in an iterative fashion, where work in one area may require revisiting previous testing steps. As an example, after completing a transaction you may likely need to perform additional forensic analysis on the device to ensure that sensitive data is removed as expected and not cached in an undesired fashion. As you learn more about the application at runtime, you may wish to examine additional parts of the code to determine the best way to evade a specific control. Likewise, during static analysis it may be helpful to populate the application with certain data in order to prove or refute the existence of a security flaw.&lt;br /&gt;
&lt;br /&gt;
In the future, contributors to the testing guide should consider adding entries under each section relevant to a specific platform. Over time, OWASP contributors will write platform specific guides and expand upon this body of knowledge. &lt;br /&gt;
&lt;br /&gt;
If a specific area of interest is not covered in this guide, please feel free to either: &lt;br /&gt;
&lt;br /&gt;
*write the material yourself by registering for a wiki account and contributing content: [https://www.owasp.org/index.php/Special:RequestAccount Wiki Registration]&lt;br /&gt;
*bring this up as a topic on the Mobile Project’s mailing list: [https://lists.owasp.org/mailman/listinfo/owasp-mobile-security-project Mobile Mailing List]&lt;br /&gt;
&lt;br /&gt;
Collaboration on building the guide is being performed within Google Docs. You can find the latest and greatest material here: [https://docs.google.com/document/m/?id=1N7zMXlFHtWfc00xa6lRHnVB60U4BZO4SbUrWYMbojVM&amp;amp;pli=1&amp;amp;login=1 Testing Guide Google Doc]&lt;br /&gt;
&lt;br /&gt;
== Information Gathering ==&lt;br /&gt;
&lt;br /&gt;
As a result of this initial information gathering exercise, the tester will be better prepared for the future testing phases. Testers, Developers and Security people often fail to take the time to learn the target application and supporting infrastructure, opting to dive in blind, possibly losing valuable time and missing possible attack vectors. Without a solid understanding of how the application “should” work as well as the technologies in use, the tester will not be able to identify when the application behaves in a manner that it “shouldn’t”.&lt;br /&gt;
&lt;br /&gt;
Prerequisites of this phase may require specific operating systems, platform specific software development kits (SDK’s), rooted or jailbroken devices, the ability to man-in-the-middle secure communications (i.e. HTTPS) and bypass invalid certificate checks.&lt;br /&gt;
&lt;br /&gt;
*Manually navigate through the running application to understand the basic functionality and workflow of the application. This can be performed on a real device or within a simulator/emulator. For deeper understanding of application functionality tester can proxy and sniff all network traffic from either a physical mobile device or an emulator/simulator recording and logging traffic (if your proxy tool permits logging, which most should).&lt;br /&gt;
&lt;br /&gt;
*Identify the networking interfaces used by the application, for instance:&lt;br /&gt;
**Mobile Communication (GSM, GPRS, EDGE, LTE)&lt;br /&gt;
**Wireless (Wi-Fi (802.11 standards), Bluetooth, NFC)&lt;br /&gt;
**Virtual Interfaces (i.e. VPN)&lt;br /&gt;
&lt;br /&gt;
*Determine what the application supports for access 3G, 4G, wifi and or others&lt;br /&gt;
&lt;br /&gt;
*What networking protocols are in use?&lt;br /&gt;
**Are secure protocols used where needed?&lt;br /&gt;
**Can they be switched with insecure protocols?&lt;br /&gt;
&lt;br /&gt;
*Does the application perform commerce transactions?&lt;br /&gt;
**Credit card transactions and/or stored payment information (certain industry regulations may be required (i.e. PCI DSS)).&lt;br /&gt;
**In-app purchasing of goods or features&lt;br /&gt;
**Make note for future phases to determine does the application store payment information? How is payment information secured?&lt;br /&gt;
&lt;br /&gt;
*Monitor and identify the hardware components that the application may potentially interact with&lt;br /&gt;
**NFC&lt;br /&gt;
**Bluetooth&lt;br /&gt;
**GPS&lt;br /&gt;
**Camera&lt;br /&gt;
**Microphone&lt;br /&gt;
**Sensors&lt;br /&gt;
**USB&lt;br /&gt;
&lt;br /&gt;
*Perform open source intelligence gathering (search engines, source code repositories, developer forums, etc.) to identify source code or configuration information that may be exposed (i.e. 3rd party components integrated within the application)&lt;br /&gt;
&lt;br /&gt;
*What frameworks are in use?&lt;br /&gt;
&lt;br /&gt;
*Identify if the application appears to interact with any other applications, services, or data such as:&lt;br /&gt;
**Telephony (SMS, phone)&lt;br /&gt;
**Contacts&lt;br /&gt;
**Auto correct / dictionary services&lt;br /&gt;
**Receiving data from apps and other on-device services&lt;br /&gt;
**Google Wallet&lt;br /&gt;
**iCloud&lt;br /&gt;
**Social networks (i.e. Facebook, Twitter, LinkedIn, Google+)&lt;br /&gt;
**Dropbox&lt;br /&gt;
**Evernote&lt;br /&gt;
**Email&lt;br /&gt;
**Etc.&lt;br /&gt;
&lt;br /&gt;
*Can you determine anything about the server side application environment?&lt;br /&gt;
**Hosting provider (AWS, App Engine, Heroku, Rackspace, Azure, etc.)&lt;br /&gt;
**Development environment (Rails, Java, Django, ASP.NET, etc.)&lt;br /&gt;
**Does the application leverage Single Sign On or Authentication APIs (Google Apps, Facebook, iTunes, OAuth, etc.)&lt;br /&gt;
**Any other APIs in use&lt;br /&gt;
***Payment gateways&lt;br /&gt;
***SMS messaging&lt;br /&gt;
***Social networks&lt;br /&gt;
***Cloud file storage&lt;br /&gt;
***Ad networks&lt;br /&gt;
&lt;br /&gt;
*Perform a thorough crawl of exposed web resources and sift through the requests and responses to identify potentially interesting data or behavior&lt;br /&gt;
**Leaking sensitive information (i.e. credentials) in the response&lt;br /&gt;
**Resources not exposed through the UI&lt;br /&gt;
**Error messages&lt;br /&gt;
**Cacheable information&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Static Analysis ==&lt;br /&gt;
&lt;br /&gt;
There are two primary ways static analysis will generally be performed on a mobile application: &lt;br /&gt;
#Analyzing source code obtained from development team (prefered) &lt;br /&gt;
#Using a compiled binary. &lt;br /&gt;
&lt;br /&gt;
Some level of static analysis should be performed for both dynamic and forensic analysis, as the application’s code will almost always provide valuable information to the tester (i.e. logic, backend targets, APIs, etc).&lt;br /&gt;
&lt;br /&gt;
In scenarios where the primary goal is to identify programmatic examples of security flaws, your best bet is to review pure source code as opposed to reverse engineering compiled software. For source code reviews, it is highly beneficial to have access to either a development or production instance of any web services. This includes both source code and a working test environment to perform the assessment within in order to expedite understanding of the code.&lt;br /&gt;
&lt;br /&gt;
=== Getting Started ===&lt;br /&gt;
*If the source is not directly available, decompile or disassemble the application’s binary&lt;br /&gt;
**extract the application from the device&lt;br /&gt;
**follow the appropriate steps for your platform’s application reverse engineering&lt;br /&gt;
**some applications may also require decryption prior to reverse engineering (note: decryption and code obfuscation are not the same thing)&lt;br /&gt;
&lt;br /&gt;
*Review the permissions the application requests as well as the resources that it is authorized to access (i.e. AndroidManifest.xml, iOS Entitlements or Windows Phone's WMAppManifest.xml)&lt;br /&gt;
&lt;br /&gt;
*Are there any easy to identify misconfigurations within the application found within the configuration files? Debugging flags set, world readable/writable permissions, etc.&lt;br /&gt;
&lt;br /&gt;
*What frameworks are in use? Is the application built using a cross-platform framework?&lt;br /&gt;
&lt;br /&gt;
*Identify the libraries in use including both platform provided as well as third party. Perform a quick review on the web to determine if these libraries:&lt;br /&gt;
**are up to date&lt;br /&gt;
**are free of vulnerabilities&lt;br /&gt;
**expose functionality that requires elevated privileges (access to location or contact data)&lt;br /&gt;
**native code&lt;br /&gt;
&lt;br /&gt;
*Does the application check for rooted/jailbroken devices? How is this done? How can this be circumvented? Is it as easy as changing the case of a file name or name of executable or path?&lt;br /&gt;
&lt;br /&gt;
*Determine what types of objects are implemented to create the various views within the application. This may significantly alter your test cases, as some views implement web browser functionality while others are native UI controls only.&lt;br /&gt;
&lt;br /&gt;
*Is all code expected to run within the platform’s standard runtime environment, or are some files/libraries dynamically loaded or called outside of that environment at runtime?&lt;br /&gt;
&lt;br /&gt;
*Attempt to match up every permission that the application requests with an actual concrete implementation of it within the application. Often, developers request more permission than they actually need. Identify if the same functionality could be enabled with lesser privileges.&lt;br /&gt;
&lt;br /&gt;
*Locate hard coded secrets within the application such as API keys, credentials, or proprietary business logic.&lt;br /&gt;
&lt;br /&gt;
*Identify every entry point for untrusted data entry and determine how it enforces access controls, validates and sanitizes inbound data, and passes the data off to other interpreters&lt;br /&gt;
**From web service calls&lt;br /&gt;
**Receiving data from other apps and on-device services&lt;br /&gt;
**Inbound SMS messages&lt;br /&gt;
**Reading information from the filesystem&lt;br /&gt;
&lt;br /&gt;
=== Authentication ===&lt;br /&gt;
&lt;br /&gt;
*Locate the code which handles user authentication through the UI. Assess the possible methods of user impersonation via vectors such as parameter tampering, replay attacks, and brute force attacks.&lt;br /&gt;
&lt;br /&gt;
*Check if authentication is done online/offline. Sometimes authentication is done offline, so here you can try SQLi to bypass authentication.&lt;br /&gt;
&lt;br /&gt;
*Determine if the application utilizes information beyond username/password such as&lt;br /&gt;
**contextual information (i.e.- device identifiers, location)&lt;br /&gt;
**certificates&lt;br /&gt;
**tokens&lt;br /&gt;
&lt;br /&gt;
*Does the application utilize visual swipe or touch passwords vs. conventional usernames and passwords?&lt;br /&gt;
**Assess the method of mapping the visual objects to an authentication string to determine if adequate entropy exists&lt;br /&gt;
&lt;br /&gt;
*Does the application implement functionality that permits inbound connections from other devices? (i.e.- Wi-Fi Direct, Android Beam, network services)&lt;br /&gt;
**Does the application properly authenticate the remote user or peer prior to granting access to device resources?&lt;br /&gt;
**How does the application handle excessive failed attempts at authentication?&lt;br /&gt;
**are failed attempts logged?&lt;br /&gt;
**what mechanisms exist to inform the user of a potential attack?&lt;br /&gt;
&lt;br /&gt;
*Is there account lockout implemented for limited invalid login attempts?&lt;br /&gt;
**How many invalid attempts are allowed?&lt;br /&gt;
**Does application handles DOS performed using account lockout feature?&lt;br /&gt;
**How does it unlock the user account? &lt;br /&gt;
&lt;br /&gt;
*Single Sign On, e.g.&lt;br /&gt;
**OAuth&lt;br /&gt;
**Facebook&lt;br /&gt;
**Google Apps&lt;br /&gt;
&lt;br /&gt;
*SMS&lt;br /&gt;
**How is the sender authenticated?&lt;br /&gt;
***password&lt;br /&gt;
***header information&lt;br /&gt;
***Other mechanism?&lt;br /&gt;
**Are one time passwords (OTP) used or is other sensitive account data transmitted via SMS?&lt;br /&gt;
***Can other applications access this data?&lt;br /&gt;
**What if attacker tampers OTP using gprs modem?&lt;br /&gt;
**Can application validate the tampered OTP?&lt;br /&gt;
&lt;br /&gt;
*USSD&lt;br /&gt;
**Does application use USSD/Flash messages to authenticate use?&lt;br /&gt;
***USSD based authentication is more reliable than SMS&lt;br /&gt;
&lt;br /&gt;
*Push Notifications&lt;br /&gt;
**If the application consumes information via push notifications, how does the application verify the identity of the sender?&lt;br /&gt;
&lt;br /&gt;
=== Authorization ===&lt;br /&gt;
*Review file permissions for files created at runtime&lt;br /&gt;
&lt;br /&gt;
*Determine if it is possible to access functionality not intended for your role&lt;br /&gt;
&lt;br /&gt;
**Identify if the application has role specific functionality within the mobile application&lt;br /&gt;
&lt;br /&gt;
**Locate any potential flags or values that may be set on the client from any untrusted source that can be a point of privilege elevation such as&lt;br /&gt;
***databases&lt;br /&gt;
***flat files&lt;br /&gt;
***HTTP responses&lt;br /&gt;
&lt;br /&gt;
**Find places within an application that were not anticipated being directly accessed without following the application’s intended workflow&lt;br /&gt;
&lt;br /&gt;
*Licensing&lt;br /&gt;
**Can licensing checks be defeated locally to obtain access to paid-for data resources? (i.e.- patching a binary, modifying it at runtime, or by modifying a local configuration file)&lt;br /&gt;
**Does the code suggest that licensed content is served with a non-licensed app but restricted by UI controls only?&lt;br /&gt;
**Are licensing checks performed properly by the server or platform licensing services?&lt;br /&gt;
**How does the application detect and respond to tampering?&lt;br /&gt;
***Are alerts sent to and expected by the developer?&lt;br /&gt;
***Does the application fail open or fail closed?&lt;br /&gt;
***Does the application wipe its data?&lt;br /&gt;
&lt;br /&gt;
=== Session Management ===&lt;br /&gt;
&lt;br /&gt;
*Ensure that sessions timeout locally as well as server side.&lt;br /&gt;
**Make sure Session Timeout is set to minimal value.&lt;br /&gt;
&lt;br /&gt;
*Is sensitive information utilized within the application flushed from memory upon session expiration?&lt;br /&gt;
&lt;br /&gt;
*No Session IDs should be passed in URL, ensure usage of POST method or hidden fields.&lt;br /&gt;
&lt;br /&gt;
*Detect Session Fixation/Tampering on Server Side.&lt;br /&gt;
&lt;br /&gt;
*Ensure Session tokens are randomized and are not guessable or in sequence.&lt;br /&gt;
&lt;br /&gt;
=== Data Storage ===&lt;br /&gt;
&lt;br /&gt;
*Encryption&lt;br /&gt;
**Are the algorithms used “best of breed” or do they contain known issues?&lt;br /&gt;
**How are keys derived from i.e. a password?&lt;br /&gt;
**Based on the algorithms and approaches used to encrypt data, do implementation issues exist that degrade the effectiveness of encryption?&lt;br /&gt;
**How are keys managed and stored on the device? Can this reduce the complexity in breaking the encryption?&lt;br /&gt;
&lt;br /&gt;
*Identify if the application utilizes storage areas external to the “sandboxed” locations to store unencrypted data such as:&lt;br /&gt;
**Places with limited access control granularity (SD card, tmp directories, etc.)&lt;br /&gt;
**Directories that may end up in backups or other undesired locations (iTunes backup, external storage, etc.)&lt;br /&gt;
**Cloud storage services such as Dropbox, Google Drive, or S3&lt;br /&gt;
&lt;br /&gt;
*Does the application write sensitive information to the file system at any point, such as:&lt;br /&gt;
**Credentials&lt;br /&gt;
***Username and/or password&lt;br /&gt;
***API keys&lt;br /&gt;
***Authentication tokens&lt;br /&gt;
**Payment information&lt;br /&gt;
**Patient data&lt;br /&gt;
**Signature files&lt;br /&gt;
&lt;br /&gt;
*Is sensitive information written to data stores via platform exposed APIs such as contacts?&lt;br /&gt;
&lt;br /&gt;
=== Information Disclosure ===&lt;br /&gt;
&lt;br /&gt;
*Logs&lt;br /&gt;
**Does the application log data? Is sensitive information accessible?&lt;br /&gt;
**How are the logs accessed, if so, and by which mechanism/functionality? Is log access protected?&lt;br /&gt;
**Can any of the logged information be considered a privacy violation?&lt;br /&gt;
**Is the device identifier sent that could be used to identify the user? (i.e.UDID in Apple devices)&lt;br /&gt;
**Does the application upload any log file to the server?&lt;br /&gt;
***Is the log file extension validated before upload?&lt;br /&gt;
***Is the content of the log file validated before upload? What if malicious code is embedded in log file?&lt;br /&gt;
&lt;br /&gt;
*Caches&lt;br /&gt;
**Predictive text&lt;br /&gt;
**Location information&lt;br /&gt;
**Copy and paste&lt;br /&gt;
**Application snapshot&lt;br /&gt;
**Browser cache&lt;br /&gt;
**Non-standard cache locations (i.e the various SQLite databases that apps can create if they use HTML UI components)&lt;br /&gt;
**Are HTTPS responses being cached?&lt;br /&gt;
&lt;br /&gt;
*Exceptions&lt;br /&gt;
**Does sensitive data leak in crash logs?&lt;br /&gt;
**How does application handle data/logs outside its container?&lt;br /&gt;
&lt;br /&gt;
*Third Party Libraries and APIs&lt;br /&gt;
**What permissions do they require?&lt;br /&gt;
**Do they access or transmit sensitive information?&lt;br /&gt;
Review licensing requirements for any potential violations.&lt;br /&gt;
**Can their runtime behavior expose users to privacy issues and unauthorized tracking?&lt;br /&gt;
&lt;br /&gt;
=== Web Application Issues ===&lt;br /&gt;
&lt;br /&gt;
*XSS and HTML Injection&lt;br /&gt;
**Identify places where the application passes untrusted data into a web view or browser&lt;br /&gt;
**Determine if the application properly output encodes or sanitizes the data within the appropriate context&lt;br /&gt;
*OS Command Injection (if the application utilizes a shell)&lt;br /&gt;
**Where the application permits usage of the shell, identify the entry points to manipulate or alter the commands via user input or external untrusted data&lt;br /&gt;
**Determine if an attacker can inject arbitrary commands or manipulate the intended command in any way&lt;br /&gt;
*CSRF&lt;br /&gt;
*SQL Injection&lt;br /&gt;
*Cookies&lt;br /&gt;
*HTML5&lt;br /&gt;
*XML Injection&lt;br /&gt;
*Check Cross Domain Policy&lt;br /&gt;
&lt;br /&gt;
=== Networking ===&lt;br /&gt;
&lt;br /&gt;
*Are insecure protocols used to send or receive sensitive information? Examples- FTP, SNMP v1, SSH v1&lt;br /&gt;
&lt;br /&gt;
*Are there any known issues with the specific libraries you are using to implement the protocol?&lt;br /&gt;
&lt;br /&gt;
=== Transport Layer Protection ===&lt;br /&gt;
*Does the application properly implement Certificate Pinning?&lt;br /&gt;
&lt;br /&gt;
*Are certificates validated to determine if:&lt;br /&gt;
**The certificate has not expired&lt;br /&gt;
**The certificate was issued by a valid certificate authority&lt;br /&gt;
**The remote destination information matches the information within the certificate?&lt;br /&gt;
&lt;br /&gt;
*Are certificates validated only by the operating system or also by the application that relies on it?&lt;br /&gt;
&lt;br /&gt;
*Identify if code exist to alter the behavior for traffic transiting different interfaces (i.e.- 3G/4G comms vs. Wi-Fi)? If so, is encryption applied universally across each of them&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Helpful Search Strings and Regular Expressions ===&lt;br /&gt;
&lt;br /&gt;
*DEBUG&lt;br /&gt;
*printStackTrace&lt;br /&gt;
*username/userID/password/passwd/pwd/&lt;br /&gt;
*key/encrypt/decrypt/MD5/MD4&lt;br /&gt;
*timeout/session.invalidate&lt;br /&gt;
*root/jailbreak&lt;br /&gt;
*test/demo/&lt;br /&gt;
*sqlconnection/sqlevents/sqldemo/sqlconn/sqltest&lt;br /&gt;
*account/URL/hostname/ipaddress&lt;br /&gt;
*proxy&lt;br /&gt;
&lt;br /&gt;
== Dynamic Analysis ==&lt;br /&gt;
&lt;br /&gt;
Armed with data collected during the Information Gathering and Static Analysis phases, the tester can begin an informed vulnerability assessment of the mobile application client, server and associated services.&lt;br /&gt;
&lt;br /&gt;
Dynamic analysis is conducted against the backend services and APIs and the type of tests varies depending on mobile application type.&lt;br /&gt;
&lt;br /&gt;
=== Application Types ===&lt;br /&gt;
&lt;br /&gt;
*Native Mobile Application: Native mobile applications can be installed on to the device. This type of applications generally store most of their code on the device. Any information required can be requested to the server using the HTTP/s protocol&lt;br /&gt;
&lt;br /&gt;
*Web services for Mobile Application: Native mobile application that uses SOAP or REST based web services to communicate between client and Server&lt;br /&gt;
&lt;br /&gt;
*Mobile Browser Based Application: Web browser based applications can be accessed using device’s browsers such as Safari or Chrome. Most of the commercial applications are nowadays specifically designed and optimized for mobile browsers. These applications are no different than traditional web application and all the web application vulnerabilities apply to these apps and these should be tested as traditional web apps.&lt;br /&gt;
&lt;br /&gt;
*Mobile Hybrid Applications:Applications can leverage web browser functionality within native applications, blending the risks from both classes of applications.&lt;br /&gt;
&lt;br /&gt;
In this phase, the mobile client, backend services, and host platform is analyzed/scanned in attempt to uncover potential risks, vulnerabilities and threats. The use of an intercepting proxy tool as well as automated vulnerability scanners are core to this phase. In many cases, you will also need some type of shell access to the device.&lt;br /&gt;
&lt;br /&gt;
The following outline can be used as a “Dynamic Analysis” guide in planning a mobile assessment.&lt;br /&gt;
&lt;br /&gt;
=== Establishing a Baseline ===&lt;br /&gt;
&lt;br /&gt;
*Generate File System Baseline Fingerprint (before app installation)&lt;br /&gt;
**Application interactions with the host file system must be reviewed and analyzed at various stages of testing; starting with baseline capture. This may require a shell or GUI depending on platform and/or preference.&lt;br /&gt;
&lt;br /&gt;
*Install, Configure and Use the Application&lt;br /&gt;
**Manually inspect the file system to determine what files/databases were created, what and how data is stored. Did the application store sensitive data unencrypted or trivially protected (i.e. encoded)?&lt;br /&gt;
**Generally, pay attention to credentials, payment information, or other highly sensitive information being saved to the device. Also take a look at databases, log files, predictive text caches, and crash logs.&lt;br /&gt;
&lt;br /&gt;
=== Debugging ===&lt;br /&gt;
&lt;br /&gt;
*Attach a debugger to an application to step through code execution and setting breakpoints at interesting code within the application&lt;br /&gt;
&lt;br /&gt;
*Monitor logged messages and notifications generated at runtime&lt;br /&gt;
&lt;br /&gt;
*Observe interprocess communications between the target application and other applications and services running on the mobile device.&lt;br /&gt;
&lt;br /&gt;
=== Active Testing ===&lt;br /&gt;
&lt;br /&gt;
==== Local Testing ====&lt;br /&gt;
&lt;br /&gt;
*Exposed IPC interfaces&lt;br /&gt;
**Sniff&lt;br /&gt;
**Fuzz&lt;br /&gt;
**Bypass authorization checks&lt;br /&gt;
&lt;br /&gt;
===== Cryptography =====&lt;br /&gt;
&lt;br /&gt;
*Brute force attacks against keys, pins, and hashes&lt;br /&gt;
*Attempt to reconstruct encrypted data through recovery of keys, hardcoded secrets, and any other information exposed by the application&lt;br /&gt;
&lt;br /&gt;
===== Web Applications =====&lt;br /&gt;
&lt;br /&gt;
*XSS and HTML Injection&lt;br /&gt;
**Is it possible to inject client side code (i.e. JavaScript) or HTML into the application to either modify the inner working of the application or it's user interface?&lt;br /&gt;
&lt;br /&gt;
*Command Injection (if the application utilizes a shell)&lt;br /&gt;
&lt;br /&gt;
*CSRF&lt;br /&gt;
&lt;br /&gt;
*SQL Injection&lt;br /&gt;
&lt;br /&gt;
*Cookies&lt;br /&gt;
**Are cookies issued by a server secured by using the HTTP-only and Secure flag?&lt;br /&gt;
**Is there any sensitive information stored in the cookies?&lt;br /&gt;
&lt;br /&gt;
*HTML5 Storage&lt;br /&gt;
&lt;br /&gt;
===== Authentication =====&lt;br /&gt;
&lt;br /&gt;
*Assess the methods an application uses to authenticate peers&lt;br /&gt;
**NFC&lt;br /&gt;
**SMS&lt;br /&gt;
**Push notifications&lt;br /&gt;
**Across IPC channels (identify the calling application’s privileges and identity)&lt;br /&gt;
&lt;br /&gt;
===== Authorization =====&lt;br /&gt;
*Instrument, patch, or interact with application at runtime to bypass methods intended to prevent usage of privileged or premium features&lt;br /&gt;
&lt;br /&gt;
*Determine if configuration or locally stored data can be manipulated in order to elevate a user’s privileges&lt;br /&gt;
&lt;br /&gt;
*Check the filesystem permissions for any files created at runtime&lt;br /&gt;
&lt;br /&gt;
===== File System Analysis =====&lt;br /&gt;
&lt;br /&gt;
*Assess the application’s behavior throughout it’s lifecycle to determine if special functionality is triggered to persist an application’s state when it enters different stages:&lt;br /&gt;
**Placed into the foreground&lt;br /&gt;
**Sent into the background&lt;br /&gt;
**Upon exiting the application&lt;br /&gt;
&lt;br /&gt;
*Data  storage in Cache&lt;br /&gt;
&lt;br /&gt;
*Looking for artifacts left on device&lt;br /&gt;
&lt;br /&gt;
*Unencrypted data storage on the device&lt;br /&gt;
&lt;br /&gt;
*Encryption of data in backups&lt;br /&gt;
&lt;br /&gt;
*Username/password, or app-specific unique device id stored on the device&lt;br /&gt;
&lt;br /&gt;
*Application Permissions , Privileges and Access controls on the device&lt;br /&gt;
&lt;br /&gt;
*Generally, pay attention to credentials, payment information, or other highly sensitive information being saved to the device. Also take a look at log files, predictive text caches, and crash logs.&lt;br /&gt;
&lt;br /&gt;
*Is sensitive information cached within the application’s UI back stack?&lt;br /&gt;
&lt;br /&gt;
*Utilize forensic tools to determine if deleted data can be recovered from the filesystem as well as within databases&lt;br /&gt;
&lt;br /&gt;
===== Memory Analysis =====&lt;br /&gt;
&lt;br /&gt;
*Determine if sensitive information persists within memory after performing the following actions:&lt;br /&gt;
**Logging out of the application&lt;br /&gt;
**Transition between UI components&lt;br /&gt;
&lt;br /&gt;
*Is it possible to obtain encryption keys, credentials, payment information and other sensitive information by dumping device or application memory?&lt;br /&gt;
&lt;br /&gt;
==== Remote Application/Service Testing ====&lt;br /&gt;
&lt;br /&gt;
===== Authentication =====&lt;br /&gt;
&lt;br /&gt;
*What methods are available (3G, 4G, Wifi, etc)?&lt;br /&gt;
&lt;br /&gt;
*What happens if the remote authentication service becomes unavailable?&lt;br /&gt;
&lt;br /&gt;
*Assess strength of password requirements&lt;br /&gt;
&lt;br /&gt;
*Test how account lockouts are implemented&lt;br /&gt;
&lt;br /&gt;
*Analyze (monitor traffic) how each method performs authentication. Note target wifi as this is a common area where authentication can be weak. Ensure authentication is robust and not based on trivial attributes (i.e. MDN, ESN, etc).&lt;br /&gt;
&lt;br /&gt;
*Verify that authentication tokens are terminated after a user initiates a password reset&lt;br /&gt;
&lt;br /&gt;
*Single Sign On (SSO)&lt;br /&gt;
&lt;br /&gt;
*SMS Based&lt;br /&gt;
**One Time Passwords (OTP)&lt;br /&gt;
**Two Factor Authentication&lt;br /&gt;
&lt;br /&gt;
*Push Notifications&lt;br /&gt;
&lt;br /&gt;
*Licensing&lt;br /&gt;
&lt;br /&gt;
===== Authorization =====&lt;br /&gt;
&lt;br /&gt;
*What happens if the remote authorization handling service becomes unavailable?&lt;br /&gt;
&lt;br /&gt;
*Test if direct access to backend resources is possible&lt;br /&gt;
&lt;br /&gt;
*Access controls to server side resources not enforced&lt;br /&gt;
&lt;br /&gt;
*Vertical and horizontal privilege escalation&lt;br /&gt;
&lt;br /&gt;
===== Session Management =====&lt;br /&gt;
&lt;br /&gt;
*Entropy analysis&lt;br /&gt;
*Device identifier related?&lt;br /&gt;
*Are session tokens refreshed between logouts?&lt;br /&gt;
*Lifetime and expiration&lt;br /&gt;
*Handling the session token on the device (stored, in memory, etc.)&lt;br /&gt;
*Privilege Escalation&lt;br /&gt;
*Ineffective Session Termination&lt;br /&gt;
*Session Fixation&lt;br /&gt;
*Pre-login/Login/Post-login Session checks&lt;br /&gt;
*Unique Session Generation&lt;br /&gt;
&lt;br /&gt;
===== Transport Layer Testing =====&lt;br /&gt;
*Man-in-the-middle attacks&lt;br /&gt;
*Eavesdropping&lt;br /&gt;
*SSL checks (cypher strengths/weakness etc.)&lt;br /&gt;
*SSL Striping&lt;br /&gt;
&lt;br /&gt;
===== Server Side Attacks =====&lt;br /&gt;
&lt;br /&gt;
*Triggering unhandled exceptions&lt;br /&gt;
*Cross-Site Scripting&lt;br /&gt;
*SQL Injection&lt;br /&gt;
*XML Bombs&lt;br /&gt;
*Buffer overflow&lt;br /&gt;
*Unrestricted File Upload&lt;br /&gt;
*Open Redirect&lt;br /&gt;
*Cross Origin Resource Sharing&lt;br /&gt;
&lt;br /&gt;
===== Server, Network &amp;amp; Application Scanning =====&lt;br /&gt;
&lt;br /&gt;
*Based on prior phases you should have 1 or more target servers (i.e. URLs) as candidates for automated vulnerability scanning. Mobile applications often leverage existing web services/applications (i.e. hybrid applications) which must be tested for security vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
===== Conclusion =====&lt;br /&gt;
&lt;br /&gt;
Mobile applications are continuing to mature and evolve thus to be effective, security testers must strive to advance their knowledge and skills. Please check back periodically for updates and share your feedback with us.&lt;br /&gt;
&lt;br /&gt;
= Mobile Cheat Sheet  =&lt;br /&gt;
== Mobile Cheat Sheet Series  ==&lt;br /&gt;
&lt;br /&gt;
Cheat sheets provide the information most relevant to a developer or security engineer with minimal &amp;quot;fluff&amp;quot;. The goal of the project is to build a collection of cheat sheets that provide actionable, useful, and straight to the point guidance for a plethora of mobile security issues.&lt;br /&gt;
&lt;br /&gt;
== Platform Agnostic ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Mobile_Jailbreaking_Cheat_Sheet Mobile Jailbreaking Cheat Sheet]&lt;br /&gt;
&lt;br /&gt;
== Android ==&lt;br /&gt;
&lt;br /&gt;
== iOS ==&lt;br /&gt;
&amp;lt;ul&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/IOS_Developer_Cheat_Sheet iOS Developer Cheat Sheet]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;[https://www.owasp.org/index.php/IOS_Application_Security_Testing_Cheat_Sheet iOS Application Security Testing Cheat Sheet]&amp;lt;/li&amp;gt;&lt;br /&gt;
&amp;lt;/ul&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Windows Phone (Developer Unlock) ==&lt;br /&gt;
&lt;br /&gt;
Developer Unlock:&lt;br /&gt;
You need to have machine with Windows 8 64-bit OS in it.&lt;br /&gt;
Connect your phone to Win8 machine using USB cable and start Visual Studio 2013 (with Windows Mobile package installed).&lt;br /&gt;
Go to Tool Windows Phone 8.1  Developer Unlock.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
XAP file deployment and Local Storage Check on Windows Mobile with OS 8+ &lt;br /&gt;
1.	You need to have machine with Windows 8 64-bit OS running in it.&lt;br /&gt;
2.	Install Windows 8 power tools (WP8).&lt;br /&gt;
Download WP8 here: http://wptools.codeplex.com/&lt;br /&gt;
3.	Connect your Windows Phone to Win8 machine using USB cable and WP8 will detect your device.&lt;br /&gt;
4.	You can now: install XAP files, update XAP files, check local storage (isolated storage), and get various attributes.&lt;br /&gt;
&lt;br /&gt;
== RIM ==&lt;br /&gt;
&lt;br /&gt;
= Secure Mobile Development =&lt;br /&gt;
'''Secure Mobile Development Guidelines Objective'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Secure Development Guidelines provides developers with the knowledge they need to build secure mobile applications. An extendable framework will be provided that includes the core security flaws found across nearly all mobile platforms. It will be a living reference where contributors can plug in newly exposed APIs for various platforms and provide good/bad code examples along with remediation guidance for those issues.&lt;br /&gt;
&lt;br /&gt;
== Mobile Application Coding Guidelines ==&lt;br /&gt;
The purpose of this section is to provide application developers guidelines on how to build secure mobile applications, given the differences in security threat between applications running on a typical desktop as compared to those running on a mobile device (such as tablets or cell phones). &lt;br /&gt;
&lt;br /&gt;
Using the guidance provided here, developers should code their applications to mitigate these malicious attacks. While more general coding guidelines should still be followed as applicable, this page lists additional considerations and/or modifications to common guidelines and is written using the best knowledge available at this time.&lt;br /&gt;
&lt;br /&gt;
=== Authentication and Password Management ===&lt;br /&gt;
This is a set of controls used to verify the identity of a user, or other entity, interacting with the software, and also to ensure that applications handle the management of passwords in a secure fashion.&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Instances where the mobile application requires a user to create a password or PIN (say for offline access), the application should never use a PIN but enforce a password which follows a strong password policy.&lt;br /&gt;
&amp;lt;li&amp;gt; Mobile devices may offer the possibility of using password patterns which are never to be utilized in place of passwords as sufficient entropy cannot be ensured and they are easily vulnerable to smudge-attacks.&lt;br /&gt;
&amp;lt;li&amp;gt; Mobile devices may also offer the possibility of using biometric input to perform authentication which should never be used due to issues with false positives/negatives, among others.&lt;br /&gt;
&amp;lt;li&amp;gt; Wipe/clear memory locations holding passwords directly after their hashes are calculated.&lt;br /&gt;
&amp;lt;li&amp;gt; Based on risk assessment of the mobile application, consider utilizing two-factor authentication.&lt;br /&gt;
&amp;lt;li&amp;gt; For device authentication, avoid solely using any device-provided identifier (like UID or MAC address) to identify the device, but rather leverage identifiers specific to the application as well as the device (which ideally would not be reversible). For instance, create an app-unique “device-factor” during the application install or registration (such as a hashed value which is based off of a combination of the length of the application package file itself, as well as the current date/time, the version of the OS which is in use, and a randomly generated number). In this manner the device could be identified (as no two devices should ever generate the same “device-factor” based on these inputs) without revealing anything sensitive. This app-unique device-factor can be used with user authentication to create a session or used as part of an encryption key.&lt;br /&gt;
&amp;lt;li&amp;gt; In scenarios where offline access to data is needed, add an intentional X second delay to the password entry process after each unsuccessful entry attempt (2 is reasonable, also consider a value which doubles after each incorrect attempt).&lt;br /&gt;
&amp;lt;li&amp;gt; In scenarios where offline access to data is needed, perform an account/application lockout and/or application data wipe after X number of invalid password attempts (10 for example).&lt;br /&gt;
&amp;lt;li&amp;gt; When utilizing a hashing algorithm, use only a NIST approved standard such as SHA-2 or an algorithm/library.&lt;br /&gt;
&amp;lt;li&amp;gt; Salt passwords on the server-side, whenever possible. The length of the salt should at least be equal to, if not bigger than the length of the message digest value that the hashing algorithm will generate. &lt;br /&gt;
&amp;lt;li&amp;gt; Salts should be sufficiently random (usually requiring them to be stored) or may be generated by pulling constant and unique values off of the system (by using the MAC address of the host for example or a device-factor; see 3.1.2.g.). Highly randomized salts should be obtained via the use of a Cryptographically Secure Pseudorandom Number Generator (CSPRNG). When generating seed values for salt generation on mobile devices, ensure the use of fairly unpredictable values (for example, by using the x,y,z magnetometer and/or temperature values) and store the salt within space available to the application.&lt;br /&gt;
&amp;lt;li&amp;gt; Provide feedback to users on the strength of passwords during their creation.&lt;br /&gt;
&amp;lt;li&amp;gt; Based on a risk evaluation, consider adding context information (such as IP location, etc…) during authentication processes in order to perform Login Anomaly Detection.&lt;br /&gt;
&amp;lt;li&amp;gt; Instead of passwords, use industry standard authorization tokens (which expire as frequently as practicable) which can be securely stored on the device (as per the OAuth model) and which are time bounded to the specific service, as well as revocable (if possible server side).&lt;br /&gt;
&amp;lt;li&amp;gt; Integrate a CAPTCHA solution whenever doing so would improve functionality/security without inconveniencing the user experience too greatly (such as during new user registrations, posting of user comments, online polls, “contact us” email submission pages, etc…).&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure that separate users utilize different salts.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Code Obfuscation ===&lt;br /&gt;
This is a set of controls used to prevent reverse engineering of the code, increasing the skill level and the time required to attack the application.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Abstract sensitive software within static C libraries.&lt;br /&gt;
&amp;lt;li&amp;gt; Obfuscate all sensitive application code where feasible by running an automated code obfuscation program using either 3rd party commercial software or open source solutions.&lt;br /&gt;
&amp;lt;li&amp;gt; For applications containing sensitive data, implement anti-debugging techniques (e.g. prevent a debugger from attaching to the process; android:debuggable=”false”).&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure logging is disabled as logs may be interrogated other applications with readlogs permissions (e.g. on Android system logs are readable by any other application prior to being rebooted).&lt;br /&gt;
&amp;lt;li&amp;gt; So long as the architecture(s) that the application is being developed for supports it (iOS 4.3 and above, Android 4.0 and above), Address Space Layout Randomization (ASLR) should be taken advantage of to hide executable code which could be used to remotely exploit the application and hinder the dumping of application’s memory.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Communication Security ===&lt;br /&gt;
This is a set of controls to help ensure the software handles the sending and receiving of information in a secure manner.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Assume the provider network layer is insecure. Modern network layer attacks can decrypt provider network encryption, and there is no guarantee a Wi-Fi network (if in-use by the mobile device) will be appropriately encrypted.&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure the application actually and properly validates (by checking the expiration date, issuer, subject, etc…) the server’s SSL certificate (instead of checking to see if a certificate is simply present and/or just checking if the hash of the certificate matches). To note, there are third party libraries to assist in this; search on “certificate pinning”.&lt;br /&gt;
&amp;lt;li&amp;gt; The application should only communicate with and accept data from authorized domain names/systems. It is permissible to allow application updates which will modify the list of authorized systems and/or for authorized systems to obtain a token from an authentication server, present a token to the client which the client will accept.&lt;br /&gt;
&amp;lt;li&amp;gt; To protect against attacks which utilize software such as SSLStrip, implement controls to detect if the connection is not HTTPS with every request when it is known that the connection should be HTTPS (e.g. use JavaScript, Strict Transport Security HTTP Header, disable all HTTP traffic).&lt;br /&gt;
&amp;lt;li&amp;gt; The UI should make it as easy as possible for the user to find out if a certificate is valid (so the user is not totally reliant upon the application properly validating any certificates).  &lt;br /&gt;
&amp;lt;li&amp;gt; When using SSL/TLS, use certificates signed by trusted Certificate Authority (CA) providers.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Data Storage and Protection ===&lt;br /&gt;
This is a set of controls to help ensure the software handles the storing and handling of information in a secure manner. Given that mobile devices are mobile, they have a higher likelihood of being lost or stolen which should be taken into consideration here. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Only collect and disclose data which is required for business use of the application. Identify in the design phase what data is needed, its sensitivity and whether it is appropriate to collect, store and use each data type.&lt;br /&gt;
&amp;lt;li&amp;gt; Classify data storage according to sensitivity and apply controls accordingly (e.g. passwords, personal data, location, error logs, etc.). Process, store and use data according to its classification&lt;br /&gt;
&amp;lt;li&amp;gt; Store sensitive data on the server instead of the client-end device, whenever possible. Assume any data written to device can be recovered.&lt;br /&gt;
&amp;lt;li&amp;gt; Beyond the time required by the application, don’t store sensitive information on the device (e.g. GPS/tracking).&lt;br /&gt;
&amp;lt;li&amp;gt; Do not store temp/cached data in a world readable directory. Assume shared storage is untrusted.&lt;br /&gt;
&amp;lt;li&amp;gt; Encrypt sensitive data when storing or caching it to non-volatile memory (using a NIST approved encryption standard such as AES-256, 3DES, or Skipjack).&lt;br /&gt;
&amp;lt;li&amp;gt; Use the PBKDF2 function to generate strong keys for encryption algorithms while ensuring high entropy as much as possible. The number of iterations should be set as high as may be tolerated for the environment (with a minimum of 1000 iterations) while maintaining acceptable performance.&lt;br /&gt;
&amp;lt;li&amp;gt; Sensitive data (such as encryption keys, passwords, credit card #’s, etc…) should stay in RAM for as little time as possible.&lt;br /&gt;
&amp;lt;li&amp;gt; Encryption keys should not remain in RAM during the instance lifecycle of the app. Instead, keys should be generated real time for encryption/decryption as needed and discarded each time.&lt;br /&gt;
&amp;lt;li&amp;gt; So long as the architecture(s) that the application is being developed for supports it (iOS 4.3 and above, Android 4.0 and above), Address Space Layout Randomization (ASLR) should be taken advantage of to limit the impact of attacks such as buffer overflows.&lt;br /&gt;
&amp;lt;li&amp;gt; Do not store sensitive data in the keychain of iOS devices due to vulnerabilities in their cryptographic mechanisms.&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure that sensitive data (e.g. passwords, keys etc.) are not visible in cache or logs.&lt;br /&gt;
&amp;lt;li&amp;gt; Never store any passwords in clear text within the native application itself nor on the browser (e.g. save password feature on the browser).&lt;br /&gt;
&amp;lt;li&amp;gt; When displaying sensitive information (such as full account numbers), ensure that the sensitive information is cleared from memory (such as from the webView) when no longer needed/displayed.&lt;br /&gt;
&amp;lt;li&amp;gt; Do not store sensitive information in the form of typical strings. Instead use character arrays or NSMutableString (iOS specific) and clear their contents after they are no longer needed. This is because strings are typically immutable on mobile devices and reside within memory even when assigned (pointed to) a new value.&lt;br /&gt;
&amp;lt;li&amp;gt; Do not store sensitive data on external storage like SD cards if it can be avoided.&lt;br /&gt;
&amp;lt;li&amp;gt; Consider restricting access to sensitive data based on contextual information such as location (e.g. wallet app not usable if GPS data shows phone is outside Europe, car key not usable unless within 100m of car etc...).&lt;br /&gt;
&amp;lt;li&amp;gt; Use non-persistent identifiers which are not shared with other apps wherever possible - e.g. do not use the device ID number as an identifier, use a randomly generated number instead.&lt;br /&gt;
&amp;lt;li&amp;gt; Make use of remote wipe and kill switch APIs to remove sensitive information from the device in the event of theft or loss.&lt;br /&gt;
&amp;lt;li&amp;gt; Use a time based (expiry) type of control which will wipe sensitive data from the mobile device once the application has not communicated with its servers for a given period of time.&lt;br /&gt;
&amp;lt;li&amp;gt; Automatic application shutdown and/or lockout after X minutes of inactivity (e.g. 5 mins of inactivity).&lt;br /&gt;
&amp;lt;li&amp;gt; Avoid cached application snapshots in iOS: iOS can capture and store screen captures and store them as images when an application suspends. To avoid any sensitive data getting captured, use one or both of the following options: 1. Use the ‘willEnterBackground’ callback, to hide all the sensitive data. 2. Configure the application in the info.plist file to terminate the app when pushed to background (only use if multitasking is disabled).&lt;br /&gt;
&amp;lt;li&amp;gt; Prevent applications from being moved and/or run from external storage such as via SD cards.&lt;br /&gt;
&amp;lt;li&amp;gt; When handling sensitive data which does not need to be presented to users (e.g. account numbers), instead of using the actual value itself, use a token which maps to the actual value on the server-side. This will prevent exposure of sensitive information.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Paywall Controls ===&lt;br /&gt;
This is a set of practices to ensure the application properly enforces access controls related to resources which require payment in order to access (such as access to premium content, access to additional functionality, access to improved support, etc…). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Maintain logs of access to paid-for resources in a non-repudiable format (e.g. a signed receipt sent to a trusted server backend – with user consent) and make them securely available to the end-user for monitoring.&lt;br /&gt;
&amp;lt;li&amp;gt; Warn users and obtain consent for any cost implications for application behavior.&lt;br /&gt;
&amp;lt;li&amp;gt; Secure account/pricing/billing/item information as it relates to users. If client has made any purchases via the application for instance, we should ensure that what they bought, the size of purchase, the quantity of the purchase, etc… should all be treated as sensitive information.&lt;br /&gt;
&amp;lt;li&amp;gt; Use a white-list model by default for paid-for resource addressing.&lt;br /&gt;
&amp;lt;li&amp;gt; Check for anomalous usage patterns in paid-for resource usage and trigger re- authentication. E.g. significant change in location occurs, user-language changes, etc...&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Server Controls ===&lt;br /&gt;
This is a set of practices to ensure the server side program which interfaces with the mobile application is properly safeguarded. These controls would also apply in cases where the mobile application may be integrating with vended solutions hosted outside of the typical network.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure that the backend system(s) are running with a hardened configuration with the latest security patches applied to the OS, Web Server and other application components.&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure adequate logs are retained on the backend in order to detect and respond to incidents and perform forensics (within the limits of data protection law).&lt;br /&gt;
&amp;lt;li&amp;gt; Employ rate limiting and throttling on a per-user/IP basis (if user identification is available) to reduce the risk from DoS type of attacks.&lt;br /&gt;
&amp;lt;li&amp;gt; Carry out a specific check of your code for any sensitive data unintentionally transferred between the mobile application and the back-end servers, and other external interfaces (e.g. is location or other information included transmissions?).&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure the server rejects all unencrypted requests which it knows should always arrive encrypted.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Session Management ===&lt;br /&gt;
This is a set of controls to help ensure mobile applications handle sessions in a secure manner.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Perform a check at the start of each activity/screen to see if the user is in a logged in state and if not, switch to the login state.&lt;br /&gt;
&amp;lt;li&amp;gt; When an application’s session is timed out, the application should discard and clear all memory associated with the user data, and any master keys used to decrypt the data.&lt;br /&gt;
&amp;lt;li&amp;gt; Session tokens should be revocable (particularly on the server side).&lt;br /&gt;
&amp;lt;li&amp;gt; Use lower timeout values to invalidate expired sessions (in contrast to the typical timeout values on traditional (non-mobile) applications).&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Use of 3rd Party Libraries/Code ===&lt;br /&gt;
This is a set of practices to ensure the application integrates securely with code produced from outside parties.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt;Vet the security/authenticity of any third party code/libraries used in your mobile application (e.g. making sure they come from a reliable source, will continue to be supported, contain no backdoors) and ensure that adequate internal approval is obtained to use the code/library.&lt;br /&gt;
&amp;lt;li&amp;gt; Track all third party frameworks/API’s used in the mobile application for security patches and perform upgrades as they are released.&lt;br /&gt;
&amp;lt;li&amp;gt; Pay particular attention to validating all data received from and sent to non-trusted third party apps (e.g. ad network software) before incorporating their use into an application.&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Mobile Application Provisioning/Distribution/Testing ==&lt;br /&gt;
This is a set of controls to ensure that software is tested and released relatively free of vulnerabilities, that there are mechanisms to report new security issues if they are found, and also that the software has been designed to accept patches in order to address potential security issues. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;ol type=&amp;quot;a&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;li&amp;gt; Design &amp;amp; distribute applications to allow updates for security patches.&lt;br /&gt;
&amp;lt;li&amp;gt; Provide &amp;amp; advertise feedback channels for users to report security problems with applications (such as a MobileAppSecurity@ntrs.com email address).&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure that older versions of applications which contain security issues and are no longer supported are removed from app-stores/app-repositories.&lt;br /&gt;
&amp;lt;li&amp;gt; Periodically test all backend services (Web Services/REST) which interact with a mobile application as well as the application itself for vulnerabilities using enterprise approved automatic or manual testing tools (including internal code reviews).&lt;br /&gt;
&amp;lt;li&amp;gt; Based on risk assessment of the application, have the application go through Security Assessment for a review of security vulnerabilities following the Team’s internal security testing of the application.&lt;br /&gt;
&amp;lt;li&amp;gt; Utilize the Enterprise provisioning process (e.g. IDM) to request and approve access for users on the mobile application.&lt;br /&gt;
&amp;lt;li&amp;gt; Ensure the application is sufficiently obfuscated prior to release by conducting tests which attempt to reverse engineer the obfuscated application.&lt;br /&gt;
&amp;lt;li&amp;gt; Distribute applications via an app-store type of interface (when appropriate) as many app-stores monitor applications for insecure code which we may benefit from.&lt;br /&gt;
&amp;lt;li&amp;gt; Digitally sign applications using a code signing certificate obtained via a trusted Certificate Authority (CA).&lt;br /&gt;
&amp;lt;/ol&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Top 10 Mobile Controls =&lt;br /&gt;
==OWASP/ENISA Collaboration==&lt;br /&gt;
&lt;br /&gt;
OWASP and the European Network and Information Security Agency (ENISA) collaborated to build a joint set of controls. ENISA has published the results of the collaborative effort as the &amp;quot;Smartphone Secure Development Guideline&amp;quot;: http://www.enisa.europa.eu/activities/application-security/smartphone-security-1/smartphone-secure-development-guidelines&lt;br /&gt;
&lt;br /&gt;
[[File:OWASP_Mobile_Top_10_Controls.jpg|center|800px]]&lt;br /&gt;
&lt;br /&gt;
==Contributors==&lt;br /&gt;
&lt;br /&gt;
This document has been jointly produced with ENISA as well as the following individuals:&lt;br /&gt;
*Vinay Bansal, Cisco Systems&lt;br /&gt;
*Nader Henein, Research in Motion&lt;br /&gt;
*Giles Hogben, ENISA&lt;br /&gt;
*Karsten Nohl, Srlabs&lt;br /&gt;
*Jack Mannino, nVisium Security&lt;br /&gt;
*Christian Papathanasiou, Royal Bank of Scotland&lt;br /&gt;
*Stefan Rueping, Infineon&lt;br /&gt;
*Beau Woods, Stratigos Security&lt;br /&gt;
&lt;br /&gt;
== Top 10 mobile controls and design principles==&lt;br /&gt;
&lt;br /&gt;
'''[[#section control_1|1. Identify and protect sensitive data on the mobile device]]'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Unsafe sensitive data storage, attacks on decommissioned phones unintentional disclosure: Mobile devices (being mobile) have a higher risk of loss or theft. Adequate protection should be built in to minimize the loss of sensitive data on the device.&lt;br /&gt;
&lt;br /&gt;
*1.1 In the design phase, classify data storage according to sensitivity and apply controls accordingly (e.g. passwords, personal data, location, error logs, etc.). Process, store and use data according to its classification. Validate the security of API calls applied to sensitive data.&lt;br /&gt;
*1.2 Store sensitive data on the server instead of the client-end device. This is based on the assumption that secure network connectivity is sufficiently available and that protection mechanisms available to server side storage are superior. The relative security of client vs server-side security also needs to be assessed on a case-by-case basis (see ENISA cloud risk assessment (3) or the OWASP Cloud top 10 (4) for decision support).&lt;br /&gt;
*1.3 When storing data on the device, use a file encryption API provided by the OS or other trusted source. Some platforms provide file encryption APIs which use a secret key protected by the device unlock code and deleteable on remote kill. If this is available, it should be used as it increases the security of the encryption without creating extra burden on the end-user. It also makes stored data safer in the case of loss or theft. However, it should be born in mind that even when protected by the device unlock key, if data is stored on the device, its security is dependent on the security of the device unlock code if remote deletion of the key is for any reason not possible.&lt;br /&gt;
*1.4 Do not store/cache sensitive data (including keys) unless they are encrypted and if possible stored in a tamper-proof area (see control 2).&lt;br /&gt;
*1.5 Consider restricting access to sensitive data based on contextual information such as location (e.g. wallet app not usable if GPS data shows phone is outside Europe, car key not usable unless within 100m of car etc...).&lt;br /&gt;
*1.6 Do not store historical GPS/tracking or other sensitive information on the device beyond the period required by the application (see controls 1.7, 1.8).&lt;br /&gt;
*1.7 Assume that shared storage is untrusted - information may easily leak in unexpected ways through any shared storage. In particular:&lt;br /&gt;
**Be aware of caches and temporary storage as a possible leakage channel, when shared with other apps.&lt;br /&gt;
**Be aware of public shared storage such as address book, media gallery and audio files as a possible leakage channel. For example storing images with location metadata in the media-gallery allows that information to be shared in unintended ways.&lt;br /&gt;
**Do not store temp/cached data in a world readable directory.&lt;br /&gt;
*1.8 For sensitive personal data, deletion should be scheduled according to a maximum retention period, (to prevent e.g. data remaining in caches indefinitely).&lt;br /&gt;
*1.9 There is currently no standard secure deletion procedure for flash memory (unless wiping the entire medium/card). Therefore data encryption and secure key management are especially important.&lt;br /&gt;
*1.10 Consider the security of the whole data lifecycle in writing your application (collection over the wire, temporary storage, caching, backup, deletion etc)&lt;br /&gt;
*1.11 Apply the principle of minimal disclosure - only collect and disclose data which is required for business use of the application. Identify in the design phase what data is needed, its sensitivity and whether it is appropriate to collect, store and use each data type.&lt;br /&gt;
*1.12 Use non-persistent identifiers which are not shared with other apps wherever possible - e.g. do not use the device ID number as an identifier unless there is a good reason to do so (use a randomly generated number – see 4.3). Apply the same data minimization principles to app sessions as to http sessions/cookies etc.&lt;br /&gt;
*1.13 Applications on managed devices should make use of remote wipe and kill switch APIs to remove sensitive information from the device in the event of theft or loss. (A kill-switch is the term used for an OS-level or purpose-built means of remotely removing applications and/or data).&lt;br /&gt;
*1.14 Application developers may want to incorporate an application-specific &amp;quot;data kill switch&amp;quot; into their products, to allow the per-app deletion of their application's sensitive data when needed (strong authentication is required to protect misuse of such a feature).&lt;br /&gt;
&lt;br /&gt;
'''2. Handle password credentials securely on the device'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Spyware, surveillance, financial malware. A user's credentials, if stolen, not only provide unauthorized access to the mobile backend service, they also potentially compromise many other services and accounts used by the user. The risk is increased by the widespread of reuse of passwords across different services.&lt;br /&gt;
&lt;br /&gt;
*2.1 Instead of passwords consider using longer term authorization tokens that can be securely stored on the device (as per the OAuth model). Encrypt the tokens in transit (using SSL/TLS). Tokens can be issued by the backend service after verifying&lt;br /&gt;
￼￼￼Smartphones secure development guidelines for app developers ￼the user credentials initially. The tokens should be time bounded to the specific service as well as revocable (if possible server side), thereby minimizing the damage in loss scenarios. Use the latest versions of the authorization standards (such as OAuth 2.0). Make sure that these tokens expire as frequently as practicable.&lt;br /&gt;
*2.2 In case passwords need to be stored on the device, leverage the encryption and key-store mechanisms provided by the mobile OS to securely store passwords, password equivalents and authorization tokens. Never store passwords in clear text. Do not store passwords or long term session IDs without appropriate hashing or encryption.&lt;br /&gt;
*2.3 Some devices and add-ons allow developers to use a Secure Element e.g. (5) (6) – sometimes via an SD card module - the number of devices offering this functionality is likely to increase. Developers should make use of such capabilities to store keys, credentials and other sensitive data. The use of such secure elements gives a higher level of assurance with the standard encrypted SD card certified at FIPS 140-2 Level 3. Using the SD cards as a second factor of authentication though possible, isn't recommended, however, as it becomes a pseudo-inseparable part of the device once inserted and secured.&lt;br /&gt;
*2.4 Provide the ability for the mobile user to change passwords on the device.&lt;br /&gt;
*2.5 Passwords and credentials should only be included as part of regular backups in encrypted or hashed form.&lt;br /&gt;
*2.6 Smartphones offer the possibility of using visual passwords which allow users to memorize passwords with higher entropy. These should only be used however, if sufficient entropy can be ensured. (7)&lt;br /&gt;
*2.7 Swipe-based visual passwords are vulnerable to smudge-attacks (using grease deposits on the touch screen to guess the password). Measures such as allowing repeated patterns should be introduced to foil smudge-attacks. (8)&lt;br /&gt;
*2.8 Check the entropy of all passwords, including visual ones (see 4.1 below).&lt;br /&gt;
*2.9 Ensure passwords and keys are not visible in cache or logs.&lt;br /&gt;
*2.10 Do not store any passwords or secrets in the application binary. Do not use a generic shared secret for integration with the backend (like password embedded in code). Mobile application binaries can be easily downloaded and reverse engineered.&lt;br /&gt;
&lt;br /&gt;
'''3. Ensure sensitive data is protected in transit'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Network spoofing attacks, surveillance. The majority of smartphones are capable of using multiple network mechanisms including Wi-Fi, provider network (3G, GSM, CDMA and others), Bluetooth etc. Sensitive data passing through insecure channels could be intercepted. (9) (10)&lt;br /&gt;
&lt;br /&gt;
*3.1 Assume that the provider network layer is not secure. Modern network layer attacks can decrypt provider network encryption, and there is no guarantee that the Wi-Fi network will be appropriately encrypted.&lt;br /&gt;
*3.2 Applications should enforce the use of an end-to-end secure channel (such as SSL/TLS) when sending sensitive information over the wire/air (e.g. using Strict Transport Security - STS (11)).This includes passing user credentials, or other authentication equivalents. This provides confidentiality and integrity protection.&lt;br /&gt;
*3.3 Use strong and well-known encryption algorithms (e.g. AES) and appropriate key lengths (check current recommendations for the algorithm you use e.g. (12) page 53).&lt;br /&gt;
*3.4 Use certificates signed by trusted CA providers. Be very cautious in allowing self- signed certificates. Do not disable or ignore SSL chain validation.&lt;br /&gt;
*3.5 For sensitive data, to reduce the risk of man-in-middle attacks (like SSL proxy, SSL strip), a secure connection should only be established after verifying the identity of the remote end-point (server). This can be achieved by ensuring that SSL is only established with end-points having the trusted certificates in the key chain.&lt;br /&gt;
*3.6 The user interface should make it as easy as possible for the user to find out if a certificate is valid.&lt;br /&gt;
*3.7 SMS, MMS or notifications should not be used to send sensitive data to or from mobile end-points.&lt;br /&gt;
&lt;br /&gt;
'''Reference:''' Google vulnerability of Client Login account credentials on unprotected wifi - [http://www.google.com/url?q=http%3A%2F%2Fwww.uni-ulm.de%2Fin%2Fmi%2Fmitarbeiter%2Fkoenings%2Fcatching-authtokens.html&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNGO-Yp1KHqO8USuL0zxL1Lpwq1Usw]&lt;br /&gt;
&lt;br /&gt;
'''4. Implement user authentication,authorization and session management correctly'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Unauthorized individuals may obtain access to sensitive data or systems by circumventing authentication systems (logins) or by reusing valid tokens or cookies. (13)&lt;br /&gt;
&lt;br /&gt;
*4.1 Require appropriate strength user authentication to the application. It may be useful to provide feedback on the strength of the password when it is being entered for the first time. The strength of the authentication mechanism used depends on the sensitivity of the data being processed by the application and its access to valuable resources (e.g. costing money).&lt;br /&gt;
*4.2 It is important to ensure that the session management is handled correctly after the initial authentication, using appropriate secure protocols. For example, require authentication credentials or tokens to be passed with any subsequent request (especially those granting privileged access or modification).&lt;br /&gt;
*4.3 Use unpredictable session identifiers with high entropy. Note that random number generators generally produce random but predictable output for a given seed (i.e. the same sequence of random numbers is produced for each seed). Therefore it is important to provide an unpredictable seed for the random number generator. The standard method of using the date and time is not secure. It can be improved, for example using a combination of the date and time, the phone temperature sensor and the current x,y and z magnetic fields. In using and combining these values, well-tested algorithms which maximise entropy should be chosen (e.g. repeated application of SHA1 may be used to combine random variables while maintaining maximum entropy – assuming a constant maximum seed length).&lt;br /&gt;
*4.4 Use context to add security to authentication - e.g. IP location, etc...&lt;br /&gt;
*4.5 Where possible, consider using additional authentication factors for applications giving access to sensitive data or interfaces where possible - e.g. voice, fingerprint (if available), who-you-know, behavioural etc.&lt;br /&gt;
*4.6 Use authentication that ties back to the end user identity (rather than the device identity).&lt;br /&gt;
&lt;br /&gt;
'''5. Keep the backend APIs (services) and the platform (server) secure''' &lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Attacks on backend systems and loss of data via cloud storage. The majority of mobile applications interact with the backend APIs using REST/Web Services or proprietary protocols. Insecure implementation of backend APIs or services, and not keeping the back-end platform hardened/patched will allow attackers to compromise data on the mobile device when transferred to the backend, or to attack the backend through the mobile application. (14)&lt;br /&gt;
&lt;br /&gt;
*5.1 Carry out a specific check of your code for sensitive data unintentionally transferred, any data transferred between the mobile device and web-server back- ends and other external interfaces - (e.g. is location or other information included within file metadata).&lt;br /&gt;
*5.2 All backend services (Web Services/REST) for mobile apps should be tested for vulnerabilities periodically, e.g. using static code analyser tools and fuzzing tools for testing and finding security flaws.&lt;br /&gt;
*5.3 Ensure that the backend platform (server) is running with a hardened configuration with the latest security patches applied to the OS, Web Server and other application components.&lt;br /&gt;
*5.4 Ensure adequate logs are retained on the backend in order to detect and respond to incidents and perform forensics (within the limits of data protection law).&lt;br /&gt;
*5.5 Employ rate limiting and throttling on a per-user/IP basis (if user identification is available) to reduce the risk from DDoS attack.&lt;br /&gt;
*5.6 Test for DoS vulnerabilities where the server may become overwhelmed by certain resource intensive application calls.&lt;br /&gt;
*5.7 Web Services, REST and APIs can have similar vulnerabilities to web applications:&lt;br /&gt;
**Perform abuse case testing, in addition to use case testing&lt;br /&gt;
**Perform testing of the backend Web Service, REST or API to determine vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
'''6. Secure data integration with third party services and applications'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Data leakage. Users may install applications that may be malicious and can transmit personal data (or other sensitive stored data) for malicious purposes.&lt;br /&gt;
&lt;br /&gt;
*6.1 Vet the security/authenticity of any third party code/libraries used in your mobile application (e.g. making sure they come from a reliable source, with maintenance supported, no backend Trojans)&lt;br /&gt;
*6.2 Track all third party frameworks/APIs used in the mobile application for security patches. A corresponding security update must be done for the mobile applications using these third party APIs/frameworks.&lt;br /&gt;
*6.3 Pay particular attention to validating all data received from and sent to non-trusted third party apps (e.g. ad network software) before processing within the application.&lt;br /&gt;
&lt;br /&gt;
'''7. Pay specific attention to the collection and storage of consent for the collection and use of the user’s data'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Unintentional disclosure of personal or private information, illegal data processing. In the European Union, it is mandatory to obtain user consent for the collection of personally identifiable information (PII). (15) (16)&lt;br /&gt;
&lt;br /&gt;
*7.1 Create a privacy policy covering the usage of personal data and make it available to the user especially when making consent choices.&lt;br /&gt;
*7.2 Consent may be collected in three main ways:&lt;br /&gt;
**At install time&lt;br /&gt;
**At run-time when data is sent&lt;br /&gt;
**Via “opt-out” mechanisms where a default setting is implemented and the user has to turn it off.&lt;br /&gt;
*7.3 Check whether your application is collecting PII - it may not always be obvious - for example do you use persistent unique identifiers linked to central data stores containing personal information?&lt;br /&gt;
*7.4 Audit communication mechanisms to check for unintended leaks (e.g. image metadata).&lt;br /&gt;
*7.5 Keep a record of consent to the transfer of PII. This record should be available to the user (consider also the value of keeping server-side records attached to any user data stored). Such records themselves should minimise the amount of personal data they store (e.g. using hashing).&lt;br /&gt;
*7.6 Check whether your consent collection mechanism overlaps or conflicts (e.g. in the data handling practices stated) with any other consent collection within the same stack (e.g. APP-native + webkit HTML) and resolve any conflicts.&lt;br /&gt;
&lt;br /&gt;
'''8. Implement controls to prevent unauthorized access to paid-for resources (wallet, SMS, phone calls etc.)'''&lt;br /&gt;
'''Risks:''' Smartphone apps give programmatic (automatic) access to premium rate phone calls, SMS, roaming data, NFC payments, etc. Apps with privileged access to such API’s should take particular care to prevent abuse, considering the financial impact of vulnerabilities that giveattackers access to the user’s financial resources.&lt;br /&gt;
&lt;br /&gt;
*8.1 Maintain logs of access to paid-for resources in a non-repudiable format (e.g. a signed receipt sent to a trusted server backend – with user consent) and make them available to the end-user for monitoring. Logs should be protected from unauthorised access.&lt;br /&gt;
*8.2 Check for anomalous usage patterns in paid-for resource usage and trigger re- authentication. E.g. when significant change in location occurs, user-language changes etc.&lt;br /&gt;
*8.3 Consider using a white-list model by default for paid-for resource addressing - e.g. address book only unless specifically authorised for phone calls.&lt;br /&gt;
*8.4 Authenticate all API calls to paid-for resources (e.g. using an app developer certificate).&lt;br /&gt;
*8.5 Ensure that wallet API callbacks do not pass cleartext account/pricing/ billing/item information.&lt;br /&gt;
*8.6 Warn user and obtain consent for any cost implications for app behaviour.&lt;br /&gt;
*8.7 Implement best practices such as fast dormancy (a 3GPP specification), caching, etc. to minimize signalling load on base stations.&lt;br /&gt;
&lt;br /&gt;
'''9. Ensure secure distribution/provisioning of mobile applications'''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Use of secure distribution practices is important in mitigating all risks described in the OWASP Mobile Top 10 Risks and ENISA top 10 risks.&lt;br /&gt;
*9.1 Applications must be designed and provisioned to allow updates for security patches, taking into account the requirements for approval by app-stores and the extra delay this may imply.&lt;br /&gt;
*9.2 Most app-stores monitor apps for insecure code and are able to remotely remove apps at short notice in case of an incident. Distributing apps through official app- stores therefore provides a safety-net in case of serious vulnerabilities in your app.&lt;br /&gt;
*9.3Provide feedback channels for users to report security problems with apps – e.g. a security@ email address.&lt;br /&gt;
&lt;br /&gt;
'''10. Carefully check any runtime interpretation of code for errors '''&lt;br /&gt;
&lt;br /&gt;
'''Risks:''' Runtime interpretation of code may give an opportunity for untrusted parties to provide unverified input which is interpreted as code. For example, extra levels in a game, scripts, interpreted SMS headers. This gives an opportunity for malware to circumvent walled garden controls provided by app-stores. It can lead to injection attacks leading to Data leakage, surveillance, spyware, and diallerware.&lt;br /&gt;
&lt;br /&gt;
Note that it is not always obvious that your code contains an interpreter. Look for any capabilities accessible via user-input data and use of third party API’s which may interpret user-input - e.g. JavaScript interpreters.&lt;br /&gt;
&lt;br /&gt;
*10.1 Minimize runtime interpretation and capabilities offered to runtime interpreters: run interpreters at minimal privilege levels.&lt;br /&gt;
*10.2 Define comprehensive escape syntax as appropriate.&lt;br /&gt;
*10.3 Fuzz test interpreters.&lt;br /&gt;
*10.4 Sandbox interpreters.&lt;br /&gt;
&lt;br /&gt;
''Appendix A- Relevant General Coding Best Practices'''&lt;br /&gt;
&lt;br /&gt;
Some general coding best practices are particularly relevant to mobile coding. We have listed some of the most important tips here:&lt;br /&gt;
**Perform abuse case testing, in addition to use case testing.&lt;br /&gt;
**Validate all input.&lt;br /&gt;
**Minimise lines and complexity of code. A useful metric is cyclomatic complexity (17).&lt;br /&gt;
**Use safe languages (e.g. from buffer-overflow).&lt;br /&gt;
**Implement a security report handling point (address) security@example.com&lt;br /&gt;
**Use static and binary code analysers and fuzz-testers to find security flaws.&lt;br /&gt;
**Use safe string functions, avoid buffer and integer overflow.&lt;br /&gt;
**Run apps with the minimum privilege required for the application on the operating&lt;br /&gt;
system. Be aware of privileges granted by default by APIs and disable them.&lt;br /&gt;
**Don't authorize code/app to execute with root/system administrator privilege&lt;br /&gt;
**Always perform testing as a standard as well as a privileged user&lt;br /&gt;
**Avoid opening application-specific server sockets (listener ports) on the client device.&lt;br /&gt;
Use the communication mechanisms provided by the OS.&lt;br /&gt;
**Remove all test code before releasing the application&lt;br /&gt;
**Ensure logging is done appropriately but do not record excessive logs, especially those&lt;br /&gt;
including sensitive user information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Appendix B- Enterprise Guidelines''&lt;br /&gt;
**If a business-sensitive application needs to be provisioned on a device, applications should enforce of a higher security posture on the device (such as PIN, remote management/wipe, app monitoring)&lt;br /&gt;
**Device certificates can be used for stronger device authentication.'&lt;br /&gt;
&lt;br /&gt;
''References&amp;quot;&lt;br /&gt;
*1.ENISA. Top Ten Smartphone Risks . [Online] http://www.enisa.europa.eu/act/application-security/smartphone-security-1/top-ten-risks.&lt;br /&gt;
*2. OWASP. Top 10 mobile risks. [Online] https://www.owasp.org/index.php/OWASP_Mobile_Security_Project#tab=Top_Ten_Mobile_Risks.&lt;br /&gt;
*3. Cloud Computing: Benefits, Risks and Recommendations for information security. [Online] 2009. http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-assessment.&lt;br /&gt;
*4. OWASP Cloud Top 10. [Online] https://www.owasp.org/index.php/Category:OWASP_Cloud_%E2%80%90_10_Project.&lt;br /&gt;
*5. Blackberry developers documents. [Online] http://www.blackberry.com/developers/docs/7.0.0api/net/rim/device/api/io/nfc/se/SecureElement.h tml,.&lt;br /&gt;
*6. Google Seek For Android. [Online] http://code.google.com/p/seek-for-android/.&lt;br /&gt;
*7. Visualizing Keyboard Pattern Passwords. [Online] cs.wheatoncollege.edu/~mgousie/comp401/amos.pdf.&lt;br /&gt;
*8. Smudge Attacks on Smartphone Touch Screens. Adam J. Aviv, Katherine Gibson, Evan Mossop, Matt Blaze, and Jonathan M. Smith. s.l. : Department of Computer and Information Science – University of Pennsylvania.&lt;br /&gt;
*9. Google vulnerability of Client Login account credentials on unprotected . [Online] http://www.uni- ulm.de/in/mi/mitarbeiter/koenings/catching-authtokens.html.&lt;br /&gt;
*10. SSLSNIFF. [Online] http://blog.thoughtcrime.org/sslsniff-anniversary-edition. 11. [Online] http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-02.&lt;br /&gt;
￼￼￼￼Smartphones secure development guidelines for app developers&lt;br /&gt;
*11. [Online] http://tools.ietf.org/html/draft-ietf-websec-strict-transport-sec-02.&lt;br /&gt;
￼*12. NIST Computer Security. [Online] http://csrc.nist.gov/publications/nistpubs/800-57/sp800- 57_PART3_key-management_Dec2009.pdf.&lt;br /&gt;
*13. Google's ClientLogin implementation . [Online] http://www.uni- ulm.de/in/mi/mitarbeiter/koenings/catching-authtokens.html.&lt;br /&gt;
*14. [Online] https://www.owasp.org/index.php/Web_Services.&lt;br /&gt;
*15. EU Data Protection Directive 95/46/EC. [Online] http://eur- lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML.&lt;br /&gt;
*16. [Online] http://democrats.energycommerce.house.gov/sites/default/files/image_uploads/Testimony_05.04.11 _Spafford.pdf.&lt;br /&gt;
*17. [Online] http://www.aivosto.com/project/help/pm-complexity.html.&lt;br /&gt;
*18. [Online] http://code.google.com/apis/accounts/docs/AuthForInstalledApps.html.&lt;br /&gt;
**19. Google Wallet Security. [Online] http://www.google.com/wallet/how-it-works-security.htm.&lt;br /&gt;
&lt;br /&gt;
= OWASP Mobile Threat Model Project =&lt;br /&gt;
==Mobile Application Threat Model - Beta Release==&lt;br /&gt;
&lt;br /&gt;
This is the first release (February 2013) of the Mobile Application Threat Model developed by the initial project team (listed at the end of this release).  Development began mid-2011 and is being released in beta form for public comment and input.  It is by no means complete and some sections will need more contributions, details and also real world case studies.  It's the hope of the project team that others in the community can help contribute to this project to further enhance and improve this threat model.&lt;br /&gt;
&lt;br /&gt;
===Mobile Threat Model Introduction Statement===&lt;br /&gt;
Threat modeling is a systematic process that begins with a clear understanding of the system. It is necessary to define the following areas to understand possible threats to the application:&lt;br /&gt;
* '''Mobile Application Architecture''' - This area describes how the application is designed from device specific features used by the application, wireless transmission protocols, data transmission mediums, interaction with hardware components and other applications.&lt;br /&gt;
* '''Mobile Data''' - What data does the application store and process? What is the business purpose of this data and what are the data workflows?&lt;br /&gt;
* '''Threat Agent Identification''' - What are the threats to the mobile application and who are the threat agents.  This area also outlines the process for defining what threats apply to the mobile application.&lt;br /&gt;
* '''Methods of Attack''' - What are the most common attacks utilized by threat agents.  This area defines these attacks so that controls can be developed to mitigate attacks.&lt;br /&gt;
* '''Controls''' - What are the controls to prevent attacks.  This is the last area to be defined only after previous areas have been completed by the development team.&lt;br /&gt;
&lt;br /&gt;
===Target Audience for the Mobile Threat Model===&lt;br /&gt;
This model is to be used by mobile application developers and software architects as part of the “threat modeling” phase of a typical SDLC process.  The model can also be used by Information Security Professionals that need to determine what typical mobile application threats are and provide a methodology for conducting basic threat modeling.&lt;br /&gt;
&lt;br /&gt;
===How to Use the Mobile Threat Model===&lt;br /&gt;
This threat model is designed as an outline or checklist of items that need to be documented, reviewed and discussed when developing a mobile application.  Every organization that develops mobile applications will have different requirements as well as threats.  This model was designed to be as organizational and industry agnostic as possible so that any mobile application development team can use this as a guide for conducting threat modeling for their specific application. Real world case studies as examples will be integrated to this threat model in the near future.&lt;br /&gt;
&lt;br /&gt;
==Mobile Application Architecture==&lt;br /&gt;
&lt;br /&gt;
The mobile application architecture should, at the very least, describe device specific features used by the application, wireless transmission protocols, data transmission medium, interaction with hardware components and other applications. Applications can be mapped to this architecture as a preliminary attack surface assessment.&lt;br /&gt;
&lt;br /&gt;
===Architecture Considerations===&lt;br /&gt;
&lt;br /&gt;
Although mobile applications vary in function, they can be described using a generalized model as follows:&lt;br /&gt;
&lt;br /&gt;
Wireless interfaces&lt;br /&gt;
&lt;br /&gt;
Transmission Type&lt;br /&gt;
&lt;br /&gt;
Hardware Interaction&lt;br /&gt;
&lt;br /&gt;
Interaction with on device applications/services&lt;br /&gt;
&lt;br /&gt;
Interaction with off device applications/services&lt;br /&gt;
&lt;br /&gt;
Encryption Protocols&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* What is the design of the architecture (network infrastructure, web services, trust boundaries, third-party APIs, etc)&lt;br /&gt;
** Carrier&lt;br /&gt;
*** Data&lt;br /&gt;
*** SMS&lt;br /&gt;
*** Voice&lt;br /&gt;
** Endpoints&lt;br /&gt;
*** Web Services&lt;br /&gt;
**** RESTful or SOAP based&lt;br /&gt;
**** Third Party (Example: Amazon)&lt;br /&gt;
*** Websites&lt;br /&gt;
**** Does the app utilize or integrate the “mobile web” version of an existing web site?&lt;br /&gt;
*** App Stores&lt;br /&gt;
**** Google Play&lt;br /&gt;
**** Apple App Store&lt;br /&gt;
**** Windows Mobile&lt;br /&gt;
**** BlackBerry App Store&lt;br /&gt;
*** Cloud Storage&lt;br /&gt;
**** Amazon/Azure&lt;br /&gt;
*** Corporate Networks (via VPN, ssh, etc.)&lt;br /&gt;
** Wireless interfaces&lt;br /&gt;
*** 802.11&lt;br /&gt;
*** NFC&lt;br /&gt;
*** Bluetooth&lt;br /&gt;
*** RFID&lt;br /&gt;
** Device&lt;br /&gt;
*** App Layer&lt;br /&gt;
*** Runtime Environment (VM, framework dependencies, etc)&lt;br /&gt;
*** OS Platform&lt;br /&gt;
** Apple iOS&lt;br /&gt;
** Android&lt;br /&gt;
** Windows Mobile&lt;br /&gt;
** BlackBerry&lt;br /&gt;
*** Baseband&lt;br /&gt;
* Common hardware components&lt;br /&gt;
** GPS&lt;br /&gt;
** Sensors (accelerometer)&lt;br /&gt;
** Cellular Radios (GSM/CDMA/LTE)&lt;br /&gt;
** Flash Memory&lt;br /&gt;
** Removable Storage (i.e.- SD)&lt;br /&gt;
** USB ports&lt;br /&gt;
** Wireless Interfaces&lt;br /&gt;
*** 802.11&lt;br /&gt;
*** Bluetooth&lt;br /&gt;
*** NFC&lt;br /&gt;
*** RFID&lt;br /&gt;
** Touch Screen&lt;br /&gt;
** Hardware Keyboard&lt;br /&gt;
** Microphone&lt;br /&gt;
** Camera&lt;br /&gt;
* Authentication&lt;br /&gt;
** Method&lt;br /&gt;
*** Knowledge based&lt;br /&gt;
*** Token based&lt;br /&gt;
*** Biometrics&lt;br /&gt;
** Input Type&lt;br /&gt;
*** Keyboard&lt;br /&gt;
*** Touch screen&lt;br /&gt;
*** Hardware peripheral&lt;br /&gt;
** Decision Process&lt;br /&gt;
*** Local (on device)&lt;br /&gt;
*** Remote (off device)&lt;br /&gt;
* Define app architecture relative to OS stack + security model&lt;br /&gt;
** What should or shouldn't the app do?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Mobile Data==&lt;br /&gt;
This section defines what purpose does the app serve from a business perspective and what data the app store, transmit and receive.  It’s also important to review data flow diagrams to determine exactly how data is handled and managed by the application.&lt;br /&gt;
&lt;br /&gt;
* What is the business function of the app?&lt;br /&gt;
* What data does the application store/process (provide data flow diagram)&lt;br /&gt;
** This diagram should outline network, device file system and application data flows&lt;br /&gt;
** How is data transmitted between third party API’s and app(s)&lt;br /&gt;
** Are there different data handling requirements between different mobile platforms? (iOS/Android/Blackberry/Windows/J2ME) &lt;br /&gt;
** Does the app use cloud storage APIs (Dropbox, Google Drive, iCloud, Lookout) for device data backups&lt;br /&gt;
** Does personal data intermingle with corporate data?&lt;br /&gt;
** Is there specific business logic built into the app to process data?&lt;br /&gt;
* What does the data give you (or an attacker) access to&lt;br /&gt;
** Data at Rest&lt;br /&gt;
** Example: Do stored credentials provide authentication?&lt;br /&gt;
** Data in Transit&lt;br /&gt;
** Example: Do stored keys allow you to break crypto functions (data integrity)?&lt;br /&gt;
* Third party data, is it being stored/transmitted?&lt;br /&gt;
** What is the privacy requirements of user data&lt;br /&gt;
** Example: UDID or Geolocation on iOS transmitted to 3rd party&lt;br /&gt;
** Are there regulatory requirements to meet specific to user privacy?&lt;br /&gt;
* How does other data on the device affect the app (sandboxing restrictions enforced?)&lt;br /&gt;
** Example: Authentication credentials shared between apps&lt;br /&gt;
* What is the impact of Jailbroken/Rooted vs Non Jailbroken/Rooted device and how this affects app data (can also relate to threat agent identification)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Threat Agent Identification==&lt;br /&gt;
What are the threats to the mobile application and who are the threat agents.  This area also outlines the process for defining what threats apply to the mobile application.&lt;br /&gt;
&lt;br /&gt;
===Identifying Threat Agents===&lt;br /&gt;
&lt;br /&gt;
The process of identifying a threat agent is very simple and have been mentioned in the below steps:&lt;br /&gt;
&lt;br /&gt;
'''S1''': Take the list of all sensitive data (or information to protect) listed down from Section 2 – Mobile Data&lt;br /&gt;
&lt;br /&gt;
'''S2:''' Make a list of all the ways to access this data&lt;br /&gt;
&lt;br /&gt;
'''S3:''' The medium used to access the same listed in S3 is the Threat Agent to be identified&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Threat Agent Identification Example===&lt;br /&gt;
&lt;br /&gt;
Let us understand it in a better way using an example of a Financial Application (specifically a Banking Application). Following the process as mentioned above:&lt;br /&gt;
&lt;br /&gt;
'''S1:''' Sensitive data present in the application has been listed as: Beneficiary Details stored in some form in the Phone Application Memory and User Credentials used for authentication transmitted to the server.&lt;br /&gt;
'''S2:''' List the various ways of accessing information:&lt;br /&gt;
&lt;br /&gt;
# Beneficiary Details:&lt;br /&gt;
## A device user aiming to browse through the memory card / phone memory&lt;br /&gt;
## An adversary using a jail broken phone; starts reading the content through putty/WinSCP via SSH&lt;br /&gt;
## An adversary while sniffing the WiFi, traffic sniffs the content travelling through the network&lt;br /&gt;
## Another malicious application while reading the phone memory contents, stumbles upon this data as the device is Jailbroken&lt;br /&gt;
## Another application which is sending data through SMS sends this data.&lt;br /&gt;
## A Web Application executing a script on the browser tries to get steal the phone memory and send it to its server.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''S3:''' From the above points, we list down the medium used:&lt;br /&gt;
&lt;br /&gt;
# Any user who has the device (Stolen device/ friend / etc)&lt;br /&gt;
## Any malicious application (installed / Web based script)&lt;br /&gt;
## An adversary sniffing the Wifi.&lt;br /&gt;
## etc.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
From the above example you should have a clear picture on how to identify Threat Agents. Below is list of threat agents, which were identified while analyzing various commonly used applications.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Listing of Threat Agents - By Category===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Human Interaction====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Stolen Device User:''' A user who obtained unauthorized access to the device aiming to get hold of the memory related sensitive information belonging to the owner of the device.&lt;br /&gt;
&lt;br /&gt;
* '''Owner of the Device:''' A user who unwillingly has installed a malicious application on his phone which gains access to the device application memory.&lt;br /&gt;
&lt;br /&gt;
* '''Common WiFi Network User­:''' This agent is aimed at any adversary intentionally or unintentionally sniffing the WiFi network used by a victim. This agent stumbles upon all the data transmitted by the victim device and may re-use it to launch further attacks.&lt;br /&gt;
&lt;br /&gt;
* '''Malicious Developer:''' A human user who has the intent of writing an application which not only provides a commonly known function like gaming / calculator / utility in the foreground but steal as much information from your device as possible in real-time and transmits it to the malicious user. This agent can also be looked at an angle from which he codes an app to perform DOS by using up all the device resources.&lt;br /&gt;
&lt;br /&gt;
* '''Organization Internal Employees:''' Any user who is part of the organization (may be a programmer / admin / user / etc). Anyone who has privileges to perform an action on the application.&lt;br /&gt;
&lt;br /&gt;
* '''App Store Approvers/Reviewers:''' Any app store which fails to review potentially dangerous code or malicious application which executes on a user’s device and performs suspicious/ malicious activities&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====Automated Programs====&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Malware on the device''': Any program / mobile application which performs suspicious activity. It can be an application, which is copying real time data from the user’s device and transmitting it to any server. This type of program executes parallel to all the processes running in the background and stays alive performing malicious activity all the time. E.g. Olympics App which stole text messages and browsing history:[http://venturebeat.com/2012/08/06/olympics-android-app/  ][http://venturebeat.com/2012/08/06/olympics-android-app/ http://venturebeat.com/2012/08/06/olympics-android-app/]&lt;br /&gt;
&lt;br /&gt;
* '''Scripts executing at the browser with HTML5''': Any script code written in a language similar to JavaScript having capability of accessing the device level content falls under this type of agent section. A script executing at the browser reading and transmitting browser memory data / complete device level data.&lt;br /&gt;
&lt;br /&gt;
* '''Malicious SMS''': An incoming SMS redirected to trigger any kind of suspicious activity on the mobile device. There are multiple services which keep running in the background. Each of these services have listeners which might be active to listen for the content of an incoming SMS. An SMS message may be a sort of trigger for the service to perform some suspicious activity.&lt;br /&gt;
&lt;br /&gt;
* '''Malicious App:''' Failure to detect malicious or vulnerable code and the likelihood of a compromise or attack against the app store itself, potentially turning legitimate code into hostile things including updates and new downloaded apps.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Below is a diagram illustrated to understand the Threat Agents and Threats in a visual manner:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[image:Mobile-app-threat-agents.png|582x527px]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Figure 1 : Pictorial Representation of Threats and Agents'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Methods of Attack==&lt;br /&gt;
In this section, we will observe different methods an attacker can use to reach the data. This data can be sensitive information to the device or something sensitive to the app itself.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attack’s Flowchart===&lt;br /&gt;
&lt;br /&gt;
Destruction of the asset is normally classified as attack. Attack can be further categorized as a planned attack or an unplanned one. Unintended attacks are normally caused due to some form of accidental actions.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[image:Mobile-app-attack-workflow.png]]&lt;br /&gt;
&lt;br /&gt;
'''Figure 2: Attack Workflow'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Attack Scenario===&lt;br /&gt;
&lt;br /&gt;
'''“Method aimed to read the local application memory”'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The above mentioned attack methodology is the one in which the data which is targeted is application specific memory and the method used is memory based analysis. The attacker steals any sensitive data like passwords, userid, user account information which is stored in the application memory by reading the device memory.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
We have listed down other methods below which can be mapped with the second section in a similar fashion:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The classification of attacks based on the way data is handled:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Carrier Based Methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Man in the middle (MiTM) attacks which can steal data packets including SMS or voice packets&lt;br /&gt;
# Hijack wireless transmission.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Endpoints based methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Inject code to tamper with web application or web services&lt;br /&gt;
# Many of the OWASP Mobile Top 10/OWASP Web Application Top 10&lt;br /&gt;
# Publishing Malwares in the app store&lt;br /&gt;
# Stealing user sensitive phone contents using Malwares&lt;br /&gt;
# Cloud storage&lt;br /&gt;
# Targeting malicious corporate network. (e.g. VPN Keys, etc)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Wireless interfaces based methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Stealing data when its in-transit using wireless channel like 802.11, NFC based data exchange or Bluetooth based data exchange. Application Level Attacks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* OS and application level methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Exploit the Input validation on client-side by by-passing the checks&lt;br /&gt;
# An adversary steals sensitive data by reading SD Card based stored content&lt;br /&gt;
# Exploiting vulnerabilities within an app or runtime environment. (VM, framework dependencies, etc)&lt;br /&gt;
# An adversary exploits OS level functionalities steal data from device or server&lt;br /&gt;
# Rooting or Jailbreaking the phone to access sensitive data from memory&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* Miscellaneous Methods&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
# Method used to exploit and steal GPS based signals which falls in users personal information&lt;br /&gt;
# Method used to exploit the flash memory&lt;br /&gt;
# Method used to perform “tap jacking” based attacks.&lt;br /&gt;
# Method used to steal keyboard cache or logs.&lt;br /&gt;
# Method used to steal microphone recordings of a user&lt;br /&gt;
# Method used to exploit and misuse the camera functionality.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Controls==&lt;br /&gt;
What are the controls to prevent attacks.  This is the last area to be defined only after previous areas have been completed by the development team.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* What are the controls to prevent an attack?&lt;br /&gt;
** Defined by platform&lt;br /&gt;
*** Apple iOS&lt;br /&gt;
*** Android&lt;br /&gt;
*** Windows Mobile&lt;br /&gt;
*** BlackBerry&lt;br /&gt;
* What are the controls to detect an attack?&lt;br /&gt;
** Defined by platform&lt;br /&gt;
*** Apple iOS&lt;br /&gt;
*** Android&lt;br /&gt;
*** Windows Mobile&lt;br /&gt;
*** BlackBerry&lt;br /&gt;
* What are the controls to mitigate/minimize impact of an attack?&lt;br /&gt;
** Defined by platform&lt;br /&gt;
*** Apple iOS&lt;br /&gt;
*** Android&lt;br /&gt;
*** Windows Mobile&lt;br /&gt;
*** BlackBerry&lt;br /&gt;
* What are the controls to protect users private information (privacy controls)&lt;br /&gt;
** Example: prompts for access to address book/geolocation&lt;br /&gt;
* Create a mapping of controls to each specific method of attack (defined in Section 4 – Methods of Attack)&lt;br /&gt;
** Create level of assurance framework based on controls implemented. This would be subjective to a certain point, but it would be useful in guiding organizations who want to achieve a certain level of risk management based on the threats and vulnerabilities&lt;br /&gt;
* Case studies, control examples&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Project Contributors==&lt;br /&gt;
Special thanks to the following team members who contributed to the initial release of the threat model:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Tom Eston (Project Lead)&lt;br /&gt;
&lt;br /&gt;
Jack Mannino&lt;br /&gt;
&lt;br /&gt;
Sreenarayan Ashokkumar&lt;br /&gt;
&lt;br /&gt;
Swapnil Deshmukh&lt;br /&gt;
&lt;br /&gt;
Brandon Knight&lt;br /&gt;
&lt;br /&gt;
Steve Jensen&lt;br /&gt;
&lt;br /&gt;
Shimon Modi&lt;br /&gt;
&lt;br /&gt;
Rodrigo Marcos&lt;br /&gt;
&lt;br /&gt;
Brandon Clark&lt;br /&gt;
&lt;br /&gt;
Yvesmarie Quemener&lt;br /&gt;
&lt;br /&gt;
Yashraj Paralikar&lt;br /&gt;
&lt;br /&gt;
Ritesh Taank&lt;br /&gt;
&lt;br /&gt;
= Mobile Device Management(MDM) =&lt;br /&gt;
==What is MDM Technology?==&lt;br /&gt;
MDM is a way to ensure employees stay productive and do not breach corporate policies. Many organizations control activities of their employees using MDM products/services. &lt;br /&gt;
MDM primarily deals with corporate data segregation, securing emails, securing corporate documents on device, enforcing corporate policies, integrating and managing mobile devices including laptops and handhelds of various categories.&lt;br /&gt;
There are two major types of MDM implementations:&lt;br /&gt;
     1.	On-premise Solution&lt;br /&gt;
     2.	Cloud-based Solution&lt;br /&gt;
For the organizations where security is highest concern, it preferred to have On-premise solution. This is always suggested for mission critical secure applications.&lt;br /&gt;
Cloud-based solution provides ease of access for the administrator.&lt;br /&gt;
&lt;br /&gt;
==How does it provide Security?==&lt;br /&gt;
All MDM products are built with an idea of Containerization. The MDM Container is secured using latest crypto techniques (AES-256 or more preferred). All the corporate data like email, documents, enterprise application are encrypted and processed inside the container. This ensures that corporate data is separated from user’s personal data on the device.&lt;br /&gt;
Additionally, encryption for entire device and/or SD Card can also be enforced depending on MDM product capability.&lt;br /&gt;
&lt;br /&gt;
'''Secure Email:'''&lt;br /&gt;
MDM products allow organization to integrate their existing email setup to be easily integrated with MDM environment. Almost all MDM products support easy integration with Exchange Server (2003/2007/2010), Office365, Lotus Notes, Blackberry Enterprise Server (BES) and others. This provided flexibility of configuring Email-over-air.&lt;br /&gt;
&lt;br /&gt;
'''Secure Docs:'''&lt;br /&gt;
It is frequently seen that, employees copy attachments downloaded from corporate email to their personal devices and then misuse it. MDM can easily restrict/disable clipboard usage in/out of Secure Container; forwarding attachments to external domains can be restricted, downloading/saving attachments on SD Card. This ensures corporate data is not left insecure.&lt;br /&gt;
&lt;br /&gt;
'''Secure Browser:'''&lt;br /&gt;
Using secure browser can avoid many potential security risks. Every MDM solution comes with built-in custom browser. Administrator can disable native browsers to force user to use Secure Browser, which is also inside the MDM container. URL filtering can be enforced to add additional productivity measure.&lt;br /&gt;
&lt;br /&gt;
'''Secure App Catalogue:'''&lt;br /&gt;
Organization can distribute, manage, and upgrade applications on employee’s device using App Catalogue. It allows applications to be pushed on user device directly from the App Store or push an enterprise developed private application through the App Catalogue. This provides an option for the organization to deploy devices in Kiosk Mode or Lock-Down Mode.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Additional MDM Features:==&lt;br /&gt;
There are plenty of other features depending on which MDM product being chosen. Below is the list for it:&lt;br /&gt;
&lt;br /&gt;
•	'''Policy Enforcing''': There are multiple types of policies which can be enforced on MDM users.&lt;br /&gt;
     1.	Persona Policy: According to corporate environment, highly customizable&lt;br /&gt;
     2.	Device Platform specific: policies for advanced management of Android, IOS, Windows and Blackberry devices.&lt;br /&gt;
     3.	Compliance Policies/Rules&lt;br /&gt;
•	VPN configuration&lt;br /&gt;
•	Application Catalogue&lt;br /&gt;
&lt;br /&gt;
•	Pre-defined Wi-Fi and Hotspot settings&lt;br /&gt;
&lt;br /&gt;
•	Jail-break/Root detection&lt;br /&gt;
&lt;br /&gt;
•	Remote Wipe of corporate data&lt;br /&gt;
&lt;br /&gt;
•	Remote Wipe of entire device&lt;br /&gt;
&lt;br /&gt;
•	Device remote locking&lt;br /&gt;
&lt;br /&gt;
•	Remote messaging/buzz&lt;br /&gt;
&lt;br /&gt;
•	Disabling native apps on device&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==More light on MDM-MAM-MEM:==&lt;br /&gt;
'''Mobile Device Management (MDM)''' is like adding an extra layer of security and ensuring a way to monitor device related activities. MDM provides device platform specific features like device encryption, platform specific policies, SD Card encryption. Geo-location tracking, connectivity profiles (VPN, Wi-Fi, Bluetooth) and plenty other features are part of MDM Suite.&lt;br /&gt;
&lt;br /&gt;
'''Mobile Application Management (MAM)''' is done by application wrapping i.e. injection arbitrary encryption code in the mobile application source. This is necessary for commercial applications or applications being developed in-house for Enterprise use. Additionally, white-listing/black-listing of application can be done. Features like Application Catalogue allow admin to push applications remotely to the devices for instant install, push remote updates and also remote removal of apps.&lt;br /&gt;
&lt;br /&gt;
'''Mobile Email Management (MEM)''' ensures your corporate emails are containerized using advanced proprietary/free encryption algorithms. MEM ensures all emails remain inside the secure container, so that attackers get encrypted data even if they try to compromise the device data using USB cable on a system. Heavy restrictions on clipboard, attachments and trusted domains can be enforced. Nothing can move in-out of the secure container as clipboard is disabled. Even the attachments are downloaded and saved inside the secure container. To view the attachments there is secure document reader as well as secure document editor available in MDM solutions. Adding trusted domains will ensure that data from corporate email is not leaked to malicious/suspicious domains.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Top MDM Vendors in Market:'''&lt;br /&gt;
&lt;br /&gt;
•	AirWatch by VMware&lt;br /&gt;
&lt;br /&gt;
•	Amtel MDM&lt;br /&gt;
&lt;br /&gt;
•	BlackBerry BES10&lt;br /&gt;
&lt;br /&gt;
•	CA Technologies MDM&lt;br /&gt;
&lt;br /&gt;
•	Citrix XenMobile&lt;br /&gt;
&lt;br /&gt;
•	Dell EMM&lt;br /&gt;
&lt;br /&gt;
•	Good Technology MDM&lt;br /&gt;
&lt;br /&gt;
•	IBM MaaS360 MDM&lt;br /&gt;
&lt;br /&gt;
•	McAfee EMM&lt;br /&gt;
&lt;br /&gt;
•	Microsoft Enterprise Mobility Suite (EMS)&lt;br /&gt;
&lt;br /&gt;
•	MobileIron EMM&lt;br /&gt;
&lt;br /&gt;
•	SAP Afaria MDM&lt;br /&gt;
&lt;br /&gt;
•	SOTI MobiControl MDM&lt;br /&gt;
&lt;br /&gt;
•	Symantec Mobile Management&lt;br /&gt;
&lt;br /&gt;
==For More Technical Details and Queries==&lt;br /&gt;
&lt;br /&gt;
'''Author: Milan Singh Thakur'''&lt;br /&gt;
&lt;br /&gt;
Contact: ''milanthakur2010@gmail.com''&lt;br /&gt;
&lt;br /&gt;
Linkedin: Connect Professionally[https://in.linkedin.com/in/milansinghthakur]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_Ten_Contributions&amp;diff=193481</id>
		<title>Mobile Top Ten Contributions</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_Ten_Contributions&amp;diff=193481"/>
				<updated>2015-04-16T09:23:28Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: /* Wiki Content */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is a work in progress. If we have omitted you, or incorrectly affiliated you, please contact us right away.&lt;br /&gt;
&lt;br /&gt;
== Project Leads ==&lt;br /&gt;
&lt;br /&gt;
* [mailto:jason.haddix@owasp.org Jason Haddix - HP Fortify]&lt;br /&gt;
* [mailto:daniel.meissler@owasp.org Daniel Miessler - HP Fortify]&lt;br /&gt;
* [mailto:jonthan.carter@owasp.org Jonathan Carter - Arxan Technologies]&lt;br /&gt;
&lt;br /&gt;
== Strategic Roadmap ==&lt;br /&gt;
&lt;br /&gt;
[[Media:OWASP Mobile Top Ten 2015 - Strategy.pdf|Strategy Document]]&lt;br /&gt;
&lt;br /&gt;
== Wiki Content ==&lt;br /&gt;
&lt;br /&gt;
* Zach Lanier&lt;br /&gt;
* Mike Zuzman&lt;br /&gt;
* [mailto:jason.haddix@owasp.org Jason Haddix - HP Fortify]&lt;br /&gt;
* [mailto:daniel.meissler@owasp.org Daniel Miessler - HP Fortify]&lt;br /&gt;
* Rahil Parikh - Gotham Digital Science&lt;br /&gt;
* Ron Gutierrez - Gotham Digital Science&lt;br /&gt;
* [mailto:jonathan.carter@owasp.org Jonathan Carter - Arxan Technologies]&lt;br /&gt;
* [mailto:chad.butler@owasp.org Chad Butler - Concur Technologies]&lt;br /&gt;
* [mailto:andrew.pannell@owasp.org Andrew Pannell - IRM]&lt;br /&gt;
&lt;br /&gt;
== Data Contributors ==&lt;br /&gt;
&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/fortify-on-demand-application-security/mobile-application-security.html HP Fortify]&lt;br /&gt;
* [https://twitter.com/andresitoath Andreas Athanasoulias &amp;amp; Syntax IT]&lt;br /&gt;
* [http://www.espheresecurity.com/ Hemil Shah and eSphere Security]&lt;br /&gt;
* [http://www.riis.com/ Godfrey Nolan and RIIS (Research Into Internet Systems)]&lt;br /&gt;
* [http://www.arxan.com/ Arxan Technologies]&lt;br /&gt;
* [http://www.bugcrowd.com/ Bugcrowd]&lt;br /&gt;
* [http://www.hacklabs.com/ Hacklabs]&lt;br /&gt;
* [http://www.ibm.com/security/xforce/ IBM X-Force Threat Intelligence]&lt;br /&gt;
* [http://www.krvw.com/ KRVW Associates]&lt;br /&gt;
* [http://www.metaintelli.com/ MetaIntelli]&lt;br /&gt;
* [http://www.purehacking.com/ Pure Hacking]&lt;br /&gt;
* [http://www.securenetwork.it/ Secure Network]&lt;br /&gt;
&lt;br /&gt;
== Data ==&lt;br /&gt;
&lt;br /&gt;
The 2015 data sets are stored at the below link:&lt;br /&gt;
&lt;br /&gt;
[https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0 https://www.dropbox.com/sh/ts32chiqnglqvy4/AADVrJCV96xTsm_sxKILxF0La?dl=0]&lt;br /&gt;
&lt;br /&gt;
== Synthesis ==&lt;br /&gt;
&lt;br /&gt;
Key observations and trends from the data can be found in here:&lt;br /&gt;
&lt;br /&gt;
* [http://www.owasp.org/images/b/b5/OWASP_Mobile_Top_Ten_2015_-_Synthesis_Document_v0.1.pdf Synthesis Document v0.1]&lt;br /&gt;
&lt;br /&gt;
== Additional Thanks ==&lt;br /&gt;
&lt;br /&gt;
* Jim Mannico&lt;br /&gt;
* Paco Hope&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad&amp;diff=192813</id>
		<title>Projects/OWASP Mobile Security Project -2015 Scratchpad</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad&amp;diff=192813"/>
				<updated>2015-04-07T09:41:16Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: /* Audience-Specific Guidance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is just a place to gather some ideas for the 2015 reworking of the Mobile Top Ten. It's totally unofficial open musings about truth, beauty, and justice.&lt;br /&gt;
&lt;br /&gt;
=What is It?=&lt;br /&gt;
&lt;br /&gt;
This is the &amp;quot;Mobile Top Ten&amp;quot; ''what''? It's the top 10 &amp;quot;stuff people tend to screw up&amp;quot;, but here are some important questions.&lt;br /&gt;
&lt;br /&gt;
* Business risk or technical risk? The business risk would be something like &amp;quot;intellectual property unprotected&amp;quot; or &amp;quot;customer data exposed.&amp;quot; A technical risk would be something like &amp;quot;data stored in plain text files.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Root cause, or final impact? Often root causes are things like not encrypting when we should. Final impact is stuff like unintended data leaks. The problem is that some of these things are overlapping. Not every lack of crypto is a data leak, but many are.&lt;br /&gt;
&lt;br /&gt;
* What threats are in scope? There are apps that simply do not care about protecting from malware, jailbreaking, etc. Think Yelp: it's just restaurant reviews. No financial impact, no reason to care about many client-side attacks. Plenty of apps ''do'' care about client-side attacks. E.g., banking, communications, health data. Many items hinge on whether or not you care about client side attacks. How do we capture this?&lt;br /&gt;
** If you care about client-side attacks, then failing to encrypt stuff is basically a data leakage.&lt;br /&gt;
** If you don't care about client-side attacks, then failing to encrypt stuff is kinda &amp;quot;gee you should do that&amp;quot;.&lt;br /&gt;
** If you care about client-side attacks, there are probably some platform features that are not sufficient as-is: the app sandbox, etc. You probably want to be putting your own additional layer of encryptiong / protection, etc.&lt;br /&gt;
** If you don't care about client-side attacks, then you simply need to be using the standard APIs (keychain, app data storage, etc.) in the standard supported ways.&lt;br /&gt;
&lt;br /&gt;
=Who is it For?=&lt;br /&gt;
&lt;br /&gt;
Do we intend this to be a tool that infosec / appsec people use? Do we intend lay people to make use of it? (e.g., developers and non-mobile IT security people) What does the target audience need to get from it?&lt;br /&gt;
&lt;br /&gt;
(''Paco's opinion'') We need to have a narrative: If you found functionality that does X, it is probably in bucket A, unless it is also doing (or not doing) Y, in which case that's bucket B.&lt;br /&gt;
&lt;br /&gt;
=Comments on Submitted Data=&lt;br /&gt;
&lt;br /&gt;
==General==&lt;br /&gt;
&lt;br /&gt;
(Jason) By looking at some data sets it becomes clear there is a doctrine that some consultancies use to do mobile testing. Some did not contribute m1 data, because they consider mobile security client-only. The same applied to m10. In addition, a couple of datasets used CWE IDs. These were harder to parse because generic CWE's do not specify if the vuln is client or server (and in a lot of these cases the vuln could be either). As Paco stated, code quality, source level findings are hard to categorize as well.&lt;br /&gt;
&lt;br /&gt;
==BugCrowd==&lt;br /&gt;
I see “storing passwords in the clear” as a very common finding among their data. It gets classifed as M5 poor authentication, M2 insecure data storage, M4 data leakage, and sometimes M6 (broken crypto).&lt;br /&gt;
&lt;br /&gt;
I see “storing session tokens insecurely” as a common finding. It is getting classified as M9 (session handling) and M2 (insecure data storage). I wonder openly whether passwords and session tokens are really that different.&lt;br /&gt;
&lt;br /&gt;
We see a lot of caching of non-password, non-session data. Some of it is done explicitly by the app, some of it is done by the mobile OS through snapshotting, backups, etc. Sometimes it is classified as “data leakage” (M4) and sometimes as insecure storage (M2). And what is interesting is that some of it is the result of the OS and some is the result of the app. Do we want to make that distinction in the T10?&lt;br /&gt;
&lt;br /&gt;
==MetaIntelli==&lt;br /&gt;
&lt;br /&gt;
They only have 18 distinct things they report on, though they have 111,000 data points. Two of the 18 things are double-counted. They appear to be categorised in both M3 and another one.&lt;br /&gt;
&lt;br /&gt;
=Other Questions=&lt;br /&gt;
Communications issues are a problem a lot. But TLS and crypto are tightly coupled. “Communications issues&amp;quot; includes certificate pinning, weak TLS ciphers, improper cert validation, HTTP and plaintext protocols, and more. There’s a lot of overlap with “broken crypto” like using Base64 instead of encryption, hard coded keys/passwords, weak hash algorithms, and so on. How do we tease out “crypto” issues from “communications” issues from “insecure storage” issues?&lt;br /&gt;
&lt;br /&gt;
I can imagine a heuristic like this:&lt;br /&gt;
* did you use crypto where you were supposed to, but the crypto primitive you chose wasn’t appropriate for the task? That’s broken crypto.&lt;br /&gt;
* Did you omit crypto entirely when you should have used it? That’s insecure comms or insecure storage.&lt;br /&gt;
&lt;br /&gt;
Some findings are deeply mobile (e.g., intent hijacking, keychain issues, jailbreak/root detection, etc.). They’re really tied to their respective platforms. Is that a problem for us? Does it matter?&lt;br /&gt;
&lt;br /&gt;
=Conclusions Drawn From Data=&lt;br /&gt;
These are conclusions proposed from the 2014 data.&lt;br /&gt;
==At Least One New Category Is Needed==&lt;br /&gt;
((Paco)) The &amp;quot;Other&amp;quot; category is not the least popular category. It's more popular, by an order of magnitude, than several others. This tells me that if we had a better category that captured &amp;quot;other&amp;quot; findings, it would be a benefit to the users of the top 10.&lt;br /&gt;
&lt;br /&gt;
==The Bottom 5 Categories account for 25% Or Less==&lt;br /&gt;
&lt;br /&gt;
The least popular 5 items are (where &amp;quot;1&amp;quot; is the least popular and &amp;quot;5&amp;quot; is 5th least popular or 6th most popular):&lt;br /&gt;
&lt;br /&gt;
# M8: Security Decisions Via Untrusted Inputs&lt;br /&gt;
# M7: Client Side Injection&lt;br /&gt;
# M9: Improper Session Handling&lt;br /&gt;
# M6: Broken Cryptography&lt;br /&gt;
# M1: Weak Server Side Controls&lt;br /&gt;
&lt;br /&gt;
Combined with the fact that the 3rd or 4th most popular category is &amp;quot;Other&amp;quot;, this suggests that 2 or 3 of these are, in fact, not in the &amp;quot;top ten&amp;quot;. They may be, for example, 11 and 12 or even higher.&lt;br /&gt;
&lt;br /&gt;
==The Existing Buckets are Hard To Use==&lt;br /&gt;
&lt;br /&gt;
A few contributors tried to categorise their findings into the existing MT10. When they did, they showed symptoms of difficulty. Some examples in the table below show how MetaIntelli flagged findings in two different categories, and BugCrowd flagged the same kind of finding in 3 different categories. This suggests that the existing MT10 is not clear enough about where these issues belong.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
! Description&lt;br /&gt;
! Contributor&lt;br /&gt;
! Categories&lt;br /&gt;
|-&lt;br /&gt;
|The app is not verifying hostname, certificate matching and validity when doing SSL secure connections.&lt;br /&gt;
|MetaIntelli&lt;br /&gt;
|M3 and M9&lt;br /&gt;
|-&lt;br /&gt;
|Contains URLs with not valid SSL certificates and/or chain of trust&lt;br /&gt;
|MetaIntelli&lt;br /&gt;
|M3 and M5&lt;br /&gt;
|-&lt;br /&gt;
|Authentication cookies stored in cleartext in sqlite database&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M9 - Improper Session Handling&lt;br /&gt;
|-&lt;br /&gt;
|Blackberry app stores credentials in plaintext&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M2 - Insecure Data Storage&lt;br /&gt;
|-&lt;br /&gt;
|Credentials and sensitive information not secured on Windows Phone app&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M5 - Poor Authorization and Authentication&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Some Topics that Show Up But Are Hard To Place==&lt;br /&gt;
&lt;br /&gt;
There are a few things that show up in the contributed data that do not have a good category to go into.&lt;br /&gt;
&lt;br /&gt;
===Code Level Findings===&lt;br /&gt;
&lt;br /&gt;
If someone is doing bad C coding (e.g., strcpy() and similar), there is no good bucket for that. Likewise, misusing the platform APIs (e.g., Android, iOS, etc.) is not well covered. It's hard to place violations of platform best practices (e.g., with intents and broadcasts and so on).&lt;br /&gt;
&lt;br /&gt;
Most of the Android developers use &amp;quot;printStackTrace&amp;quot; in their code, which is a bad practice. Even the Android APK is released in DEBUG mode.&lt;br /&gt;
&lt;br /&gt;
=OWASP Category Elements=&lt;br /&gt;
This section explores the critical elements that must be included within all OWASP Mobile Top Ten 2015 categories. Each element is listed below along with a brief description of the appropriate content. The goal is to &amp;quot;test drive&amp;quot; this list of required elements with a sample, non-commital category to verify that the elements adequately cover what is needed within each of the OWASP Mobile Top Ten 2015 categories. Each of these elements has been initially based off the Google Hangout meeting held on April 1 2015.&lt;br /&gt;
&lt;br /&gt;
==Label (generic and audience-specific labels)==&lt;br /&gt;
This element is a unique identifier for the bucket of issues that belong together. In the [https://docs.google.com/a/owasp.org/forms/d/1WMEbjVgXU4VkjHP5AcW934D9EI0_XQ5vmjb-Y5liMQY/viewform OWASP Mobile Top Ten 2015 Survey], we found that there were many different audiences that may use the OWASP Mobile Top Ten 2015 for different purposes. As always, there needs to be a generic label that uniquely identifies each bucket of issues. However, there should also be additional labels for the same category that are audience-specific to make it easier for different audiences to identify the category they are looking for. These additional labels will help clarify and differentiate the categories.&lt;br /&gt;
&lt;br /&gt;
==Overview Text==&lt;br /&gt;
This element is a generic education piece (100-200 words) around the nature of the category. It should describe the nature of the category as it relates to the different audiences (e.g., penetration testers; software engineers). It should include external references and educational links to other sources around the nature of the problem.&lt;br /&gt;
&lt;br /&gt;
==Prominent Characteristics==&lt;br /&gt;
This element eliminates any uncertainty or ambiguity that may result from vagueness / broadness in the category labels. It should include &amp;quot;headline vulnerabilities&amp;quot; that made it into the media and help each audience get a &amp;quot;gut feel&amp;quot; for what belongs to this category. In the 2014 list, we found that there were many instances where the same vulnerabilities were spread across many different categories. Hence, the need for this additional element along with a strive towards better categorisation.&lt;br /&gt;
&lt;br /&gt;
==Risk==&lt;br /&gt;
This element helps clarify how critical the category of issues is from both a business and technical perspective. During the meeting of April 1 2015, it was proposed that the CVSS classification scheme may be used here as a way of helping guide the audiences in prioritisation of the fixing of the issues.&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
This element gives coding-specific examples, CVE vulnerabilities and newsworthy events that fall into this category. This element will help clarify to the difference audiences what fits into this category. &lt;br /&gt;
 &lt;br /&gt;
== Audience Specific Guidance==&lt;br /&gt;
This element gives practical advice and guidance for category remediation that is relevant to each audience (100-200 words). Each audience may approach the issue of remediation from very different perspectives. For example, an auditor may simply want to know more about whether or not remediation is appropriate. Meanwhile, a software engineer may want to have coding-specific advice.  Each audience's concerns must be addressed in this element. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;quot;Test Drive&amp;quot; Category Element=&lt;br /&gt;
Here, we are testing a particular category to see whether or not the proposed elements for each category are adequate to address each audience's needs. It is important to note that this is a sample category and is not a formal commitment to any final category in the OWASP Mobile Top Ten 2015. It is strictly meant for testing purposes. Members who would like to 'own' particular elements in the category below should 'sign up' and add content where appropriate.&lt;br /&gt;
&lt;br /&gt;
==Insecure Data Transmission==&lt;br /&gt;
&lt;br /&gt;
===Generic Label===&lt;br /&gt;
Owner(s): Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
===Audience-Specific Labels===&lt;br /&gt;
Owner(s): Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
===Overview Text===&lt;br /&gt;
&lt;br /&gt;
This category focuses on the many available communication channels in the mobile environment and the secure transmission of data through them. If your application is using '''Wi-Fi, WiFi-direct, Bluetooth, Infra-red, RFIDs, POS devices (with NFC Tags)'''; then this category provides guidance in securing data while in transit. Included but not limited to are '''plaintext transmission of sensitive data, insufficient authentication of encrypted channel endpoints, insufficient regard to failures in building a properly encrypted channel, poor choice of security mechanisms over distinct networks''', etc.&lt;br /&gt;
&lt;br /&gt;
Additionaly, this category applies in the same way to secure data transmission in the '''Internet Of Things (IoT)'''.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Owner(s): Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
===Prominent Characteristics===&lt;br /&gt;
Owner(s): David Fern&lt;br /&gt;
&lt;br /&gt;
The key differentiator of this vulnerability is that it is concerned about unencrypted or improperly encrypted data being stolen during transmission, not on the device but through the airwaves.&lt;br /&gt;
&lt;br /&gt;
[[File:Data Transport.jpg]]&lt;br /&gt;
&lt;br /&gt;
'''Insecure Data Transmission should not be confused with others in the top 10 such as:&lt;br /&gt;
'''&lt;br /&gt;
&lt;br /&gt;
'''M3: Insufficient Transport Layer Protection''' – I DO NOT SEE ANT DIFFERENCE &lt;br /&gt;
&lt;br /&gt;
'''M4: Unintended Data Leakage''' – Unintended data leakage is a result of insecure data transmission. Once data has been stolen and interpreted it may contain information that is valuable to attackers (leaked). &lt;br /&gt;
&lt;br /&gt;
'''M6: Broken Cryptography''' – While broken cryptography does relate to data that has been improperly encrypted, and it may be an input or causes of insecure data transmission, it focuses on the encryption process/technique itself on the device transmitting the data.&lt;br /&gt;
&lt;br /&gt;
===Risk===&lt;br /&gt;
Confidential and sensitive data residing on the mobile devices if not fully SSL encrypted during transmission is highly susceptible to eavesdropping. As majority of wireless, mobile devices have capability to use and switch to various home Wifi and public unsecured Wifi. This could be disastrous while giving attackers a glimpse of your personal, non-shareable information which can lead to '''identity theft''' and '''social engineering attacks'''. Similarly, it applies to those mobile apps also where data transmission is not fully SSL encrypted and failed to perform a Valid SSL Certificate check. Additionally, this might lead further to '''man-in-the-middle attacks'''.&lt;br /&gt;
&lt;br /&gt;
Even if the application uses encryption and the device is connected to a public WiFi, an attacker can easily capture all Wireless traffic (as in War-driving). Then attacker can perform '''offline decryption''' and possibly have all your sensitive data. &lt;br /&gt;
Consider the situation where your application server uses TLS1.0/SSLv3. You think it is secure? Nope, it is highly vulnerable to attacks like '''CRIME, POODLE and Handshake Re-negotiation'''.&lt;br /&gt;
&lt;br /&gt;
Owner(s): Rajvinder Singh, Milan Singh Thakur&lt;br /&gt;
&lt;br /&gt;
===Examples===&lt;br /&gt;
Owner(s): Adam Kliarsky&lt;br /&gt;
&lt;br /&gt;
===Audience-Specific Guidance===&lt;br /&gt;
Owner(s): Andi Pannell&lt;br /&gt;
&lt;br /&gt;
From both a development and auditing stance, the easiest way to test this is to insert a proxy (such as burp) between the device running the mobile app and the wifi connection. &lt;br /&gt;
Looking for data being transferred over plain text, as well as identifying weak procotols (SSLv2, SSLv3) and ciphers (RC4, MD5) being used to transmit data.&lt;br /&gt;
&lt;br /&gt;
=Top Ten Scratchpad=&lt;br /&gt;
Here's some top-ten possible categories. This is a wiki. Edit them. Change them. Leave comments. Mark it up.&lt;br /&gt;
&lt;br /&gt;
==M1: Weak Server Side Controls                 ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M2: Insecure Data Storage                     ==&lt;br /&gt;
(Jason) As i look through the data I think more and more about how m2 and m4 might be combined.&lt;br /&gt;
&lt;br /&gt;
==M3: Insufficient Transport Layer Protection   ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M4: Unintended Data Leakage                   ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M5: Poor Authorization and Authentication     ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M6: Broken Cryptography                       ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M7: Client Side Injection                     ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M8: Security Decisions Via Untrusted Inputs   ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M9: Improper Session Handling                 ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M10: Lack of Binary Protections               ==&lt;br /&gt;
&lt;br /&gt;
(Jason) Regarding m10 - Several submissions reported m10 vulns. Unfortunately some were types of services such as binary reputation scanners, that do not have the ability to check for dynamic or code level findings. In order to fix this i recommend a name change or re-working of this category.  I want to separate out the delineation of Anti-exploit vs Code Obfuscation/Anti-reversing. Must talk to group about this.&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad&amp;diff=192572</id>
		<title>Projects/OWASP Mobile Security Project -2015 Scratchpad</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Mobile_Security_Project_-2015_Scratchpad&amp;diff=192572"/>
				<updated>2015-04-01T21:52:15Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: /* Audience-Specific Guidance */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is just a place to gather some ideas for the 2015 reworking of the Mobile Top Ten. It's totally unofficial open musings about truth, beauty, and justice.&lt;br /&gt;
&lt;br /&gt;
=What is It?=&lt;br /&gt;
&lt;br /&gt;
This is the &amp;quot;Mobile Top Ten&amp;quot; ''what''? It's the top 10 &amp;quot;stuff people tend to screw up&amp;quot;, but here are some important questions.&lt;br /&gt;
&lt;br /&gt;
* Business risk or technical risk? The business risk would be something like &amp;quot;intellectual property unprotected&amp;quot; or &amp;quot;customer data exposed.&amp;quot; A technical risk would be something like &amp;quot;data stored in plain text files.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
* Root cause, or final impact? Often root causes are things like not encrypting when we should. Final impact is stuff like unintended data leaks. The problem is that some of these things are overlapping. Not every lack of crypto is a data leak, but many are.&lt;br /&gt;
&lt;br /&gt;
* What threats are in scope? There are apps that simply do not care about protecting from malware, jailbreaking, etc. Think Yelp: it's just restaurant reviews. No financial impact, no reason to care about many client-side attacks. Plenty of apps ''do'' care about client-side attacks. E.g., banking, communications, health data. Many items hinge on whether or not you care about client side attacks. How do we capture this?&lt;br /&gt;
** If you care about client-side attacks, then failing to encrypt stuff is basically a data leakage.&lt;br /&gt;
** If you don't care about client-side attacks, then failing to encrypt stuff is kinda &amp;quot;gee you should do that&amp;quot;.&lt;br /&gt;
** If you care about client-side attacks, there are probably some platform features that are not sufficient as-is: the app sandbox, etc. You probably want to be putting your own additional layer of encryptiong / protection, etc.&lt;br /&gt;
** If you don't care about client-side attacks, then you simply need to be using the standard APIs (keychain, app data storage, etc.) in the standard supported ways.&lt;br /&gt;
&lt;br /&gt;
=Who is it For?=&lt;br /&gt;
&lt;br /&gt;
Do we intend this to be a tool that infosec / appsec people use? Do we intend lay people to make use of it? (e.g., developers and non-mobile IT security people) What does the target audience need to get from it?&lt;br /&gt;
&lt;br /&gt;
(''Paco's opinion'') We need to have a narrative: If you found functionality that does X, it is probably in bucket A, unless it is also doing (or not doing) Y, in which case that's bucket B.&lt;br /&gt;
&lt;br /&gt;
=Comments on Submitted Data=&lt;br /&gt;
&lt;br /&gt;
==General==&lt;br /&gt;
&lt;br /&gt;
(Jason) By looking at some data sets it becomes clear there is a doctrine that some consultancies use to do mobile testing. Some did not contribute m1 data, because they consider mobile security client-only. The same applied to m10. In addition, a couple of datasets used CWE IDs. These were harder to parse because generic CWE's do not specify if the vuln is client or server (and in a lot of these cases the vuln could be either). As Paco stated, code quality, source level findings are hard to categorize as well.&lt;br /&gt;
&lt;br /&gt;
==BugCrowd==&lt;br /&gt;
I see “storing passwords in the clear” as a very common finding among their data. It gets classifed as M5 poor authentication, M2 insecure data storage, M4 data leakage, and sometimes M6 (broken crypto).&lt;br /&gt;
&lt;br /&gt;
I see “storing session tokens insecurely” as a common finding. It is getting classified as M9 (session handling) and M2 (insecure data storage). I wonder openly whether passwords and session tokens are really that different.&lt;br /&gt;
&lt;br /&gt;
We see a lot of caching of non-password, non-session data. Some of it is done explicitly by the app, some of it is done by the mobile OS through snapshotting, backups, etc. Sometimes it is classified as “data leakage” (M4) and sometimes as insecure storage (M2). And what is interesting is that some of it is the result of the OS and some is the result of the app. Do we want to make that distinction in the T10?&lt;br /&gt;
&lt;br /&gt;
==MetaIntelli==&lt;br /&gt;
&lt;br /&gt;
They only have 18 distinct things they report on, though they have 111,000 data points. Two of the 18 things are double-counted. They appear to be categorised in both M3 and another one.&lt;br /&gt;
&lt;br /&gt;
=Other Questions=&lt;br /&gt;
Communications issues are a problem a lot. But TLS and crypto are tightly coupled. “Communications issues&amp;quot; includes certificate pinning, weak TLS ciphers, improper cert validation, HTTP and plaintext protocols, and more. There’s a lot of overlap with “broken crypto” like using Base64 instead of encryption, hard coded keys/passwords, weak hash algorithms, and so on. How do we tease out “crypto” issues from “communications” issues from “insecure storage” issues?&lt;br /&gt;
&lt;br /&gt;
I can imagine a heuristic like this:&lt;br /&gt;
* did you use crypto where you were supposed to, but the crypto primitive you chose wasn’t appropriate for the task? That’s broken crypto.&lt;br /&gt;
* Did you omit crypto entirely when you should have used it? That’s insecure comms or insecure storage.&lt;br /&gt;
&lt;br /&gt;
Some findings are deeply mobile (e.g., intent hijacking, keychain issues, jailbreak/root detection, etc.). They’re really tied to their respective platforms. Is that a problem for us? Does it matter?&lt;br /&gt;
&lt;br /&gt;
=Conclusions Drawn From Data=&lt;br /&gt;
These are conclusions proposed from the 2014 data.&lt;br /&gt;
==At Least One New Category Is Needed==&lt;br /&gt;
((Paco)) The &amp;quot;Other&amp;quot; category is not the least popular category. It's more popular, by an order of magnitude, than several others. This tells me that if we had a better category that captured &amp;quot;other&amp;quot; findings, it would be a benefit to the users of the top 10.&lt;br /&gt;
&lt;br /&gt;
==The Bottom 5 Categories account for 25% Or Less==&lt;br /&gt;
&lt;br /&gt;
The least popular 5 items are (where &amp;quot;1&amp;quot; is the least popular and &amp;quot;5&amp;quot; is 5th least popular or 6th most popular):&lt;br /&gt;
&lt;br /&gt;
# M8: Security Decisions Via Untrusted Inputs&lt;br /&gt;
# M7: Client Side Injection&lt;br /&gt;
# M9: Improper Session Handling&lt;br /&gt;
# M6: Broken Cryptography&lt;br /&gt;
# M1: Weak Server Side Controls&lt;br /&gt;
&lt;br /&gt;
Combined with the fact that the 3rd or 4th most popular category is &amp;quot;Other&amp;quot;, this suggests that 2 or 3 of these are, in fact, not in the &amp;quot;top ten&amp;quot;. They may be, for example, 11 and 12 or even higher.&lt;br /&gt;
&lt;br /&gt;
==The Existing Buckets are Hard To Use==&lt;br /&gt;
&lt;br /&gt;
A few contributors tried to categorise their findings into the existing MT10. When they did, they showed symptoms of difficulty. Some examples in the table below show how MetaIntelli flagged findings in two different categories, and BugCrowd flagged the same kind of finding in 3 different categories. This suggests that the existing MT10 is not clear enough about where these issues belong.&lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
! Description&lt;br /&gt;
! Contributor&lt;br /&gt;
! Categories&lt;br /&gt;
|-&lt;br /&gt;
|The app is not verifying hostname, certificate matching and validity when doing SSL secure connections.&lt;br /&gt;
|MetaIntelli&lt;br /&gt;
|M3 and M9&lt;br /&gt;
|-&lt;br /&gt;
|Contains URLs with not valid SSL certificates and/or chain of trust&lt;br /&gt;
|MetaIntelli&lt;br /&gt;
|M3 and M5&lt;br /&gt;
|-&lt;br /&gt;
|Authentication cookies stored in cleartext in sqlite database&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M9 - Improper Session Handling&lt;br /&gt;
|-&lt;br /&gt;
|Blackberry app stores credentials in plaintext&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M2 - Insecure Data Storage&lt;br /&gt;
|-&lt;br /&gt;
|Credentials and sensitive information not secured on Windows Phone app&lt;br /&gt;
|BugCrowd&lt;br /&gt;
|M5 - Poor Authorization and Authentication&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Some Topics that Show Up But Are Hard To Place==&lt;br /&gt;
&lt;br /&gt;
There are a few things that show up in the contributed data that do not have a good category to go into.&lt;br /&gt;
&lt;br /&gt;
===Code Level Findings===&lt;br /&gt;
&lt;br /&gt;
If someone is doing bad C coding (e.g., strcpy() and similar), there is no good bucket for that. Likewise, misusing the platform APIs (e.g., Android, iOS, etc.) is not well covered. It's hard to place violations of platform best practices (e.g., with intents and broadcasts and so on).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=OWASP Category Elements=&lt;br /&gt;
This section explores the critical elements that must be included within all OWASP Mobile Top Ten 2015 categories. Each element is listed below along with a brief description of the appropriate content. The goal is to &amp;quot;test drive&amp;quot; this list of required elements with a sample, non-commital category to verify that the elements adequately cover what is needed within each of the OWASP Mobile Top Ten 2015 categories. Each of these elements has been initially based off the Google Hangout meeting held on April 1 2015.&lt;br /&gt;
&lt;br /&gt;
==Label (generic and audience-specific labels)==&lt;br /&gt;
This element is a unique identifier for the bucket of issues that belong together. In the [https://docs.google.com/a/owasp.org/forms/d/1WMEbjVgXU4VkjHP5AcW934D9EI0_XQ5vmjb-Y5liMQY/viewform OWASP Mobile Top Ten 2015 Survey], we found that there were many different audiences that may use the OWASP Mobile Top Ten 2015 for different purposes. As always, there needs to be a generic label that uniquely identifies each bucket of issues. However, there should also be additional labels for the same category that are audience-specific to make it easier for different audiences to identify the category they are looking for. These additional labels will help clarify and differentiate the categories.&lt;br /&gt;
&lt;br /&gt;
==Overview Text==&lt;br /&gt;
This element is a generic education piece (100-200 words) around the nature of the category. It should describe the nature of the category as it relates to the different audiences (e.g., penetration testers; software engineers). It should include external references and educational links to other sources around the nature of the problem.&lt;br /&gt;
&lt;br /&gt;
==Prominent Characteristics==&lt;br /&gt;
This element eliminates any uncertainty or ambiguity that may result from vagueness / broadness in the category labels. It should include &amp;quot;headline vulnerabilities&amp;quot; that made it into the media and help each audience get a &amp;quot;gut feel&amp;quot; for what belongs to this category. In the 2014 list, we found that there were many instances where the same vulnerabilities were spread across many different categories. Hence, the need for this additional element along with a strive towards better categorisation.&lt;br /&gt;
&lt;br /&gt;
==Risk==&lt;br /&gt;
This element helps clarify how critical the category of issues is from both a business and technical perspective. During the meeting of April 1 2015, it was proposed that the CVSS classification scheme may be used here as a way of helping guide the audiences in prioritisation of the fixing of the issues.&lt;br /&gt;
&lt;br /&gt;
==Examples==&lt;br /&gt;
This element gives coding-specific examples, CVE vulnerabilities and newsworthy events that fall into this category. This element will help clarify to the difference audiences what fits into this category. &lt;br /&gt;
 &lt;br /&gt;
== Audience Specific Guidance==&lt;br /&gt;
This element gives practical advice and guidance for category remediation that is relevant to each audience (100-200 words). Each audience may approach the issue of remediation from very different perspectives. For example, an auditor may simply want to know more about whether or not remediation is appropriate. Meanwhile, a software engineer may want to have coding-specific advice.  Each audience's concerns must be addressed in this element. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=&amp;quot;Test Drive&amp;quot; Category Element=&lt;br /&gt;
Here, we are testing a particular category to see whether or not the proposed elements for each category are adequate to address each audience's needs. It is important to note that this is a sample category and is not a formal commitment to any final category in the OWASP Mobile Top Ten 2015. It is strictly meant for testing purposes. Members who would like to 'own' particular elements in the category below should 'sign up' and add content where appropriate.&lt;br /&gt;
&lt;br /&gt;
==Insecure Data Transmission==&lt;br /&gt;
&lt;br /&gt;
===Generic Label===&lt;br /&gt;
Owner(s): Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
===Audience-Specific Labels===&lt;br /&gt;
Owner(s): Jonathan Carter&lt;br /&gt;
&lt;br /&gt;
===Overview Text===&lt;br /&gt;
Owner(s):&lt;br /&gt;
&lt;br /&gt;
===Prominent Characteristics===&lt;br /&gt;
Owner(s):&lt;br /&gt;
&lt;br /&gt;
===Risk===&lt;br /&gt;
Owner(s): Raj Singh&lt;br /&gt;
&lt;br /&gt;
===Examples===&lt;br /&gt;
Owner(s): Adam Kliarsky&lt;br /&gt;
&lt;br /&gt;
===Audience-Specific Guidance===&lt;br /&gt;
Owner(s): Andi Pannell&lt;br /&gt;
&lt;br /&gt;
=Top Ten Scratchpad=&lt;br /&gt;
Here's some top-ten possible categories. This is a wiki. Edit them. Change them. Leave comments. Mark it up.&lt;br /&gt;
&lt;br /&gt;
==M1: Weak Server Side Controls                 ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M2: Insecure Data Storage                     ==&lt;br /&gt;
(Jason) As i look through the data I think more and more about how m2 and m4 might be combined.&lt;br /&gt;
&lt;br /&gt;
==M3: Insufficient Transport Layer Protection   ==&lt;br /&gt;
Stuff&lt;br /&gt;
&lt;br /&gt;
==M4: Unintended Data Leakage                   ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M5: Poor Authorization and Authentication     ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M6: Broken Cryptography                       ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M7: Client Side Injection                     ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M8: Security Decisions Via Untrusted Inputs   ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M9: Improper Session Handling                 ==&lt;br /&gt;
&lt;br /&gt;
Stuff&lt;br /&gt;
==M10: Lack of Binary Protections               ==&lt;br /&gt;
&lt;br /&gt;
(Jason) Regarding m10 - Several submissions reported m10 vulns. Unfortunately some were types of services such as binary reputation scanners, that do not have the ability to check for dynamic or code level findings. In order to fix this i recommend a name change or re-working of this category.  I want to separate out the delineation of Anti-exploit vs Code Obfuscation/Anti-reversing. Must talk to group about this.&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M10&amp;diff=191778</id>
		<title>Mobile Top 10 2014-M10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M10&amp;diff=191778"/>
				<updated>2015-03-19T18:07:38Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: added dex2jar reversing for Android&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|&amp;lt;center&amp;gt;Lack of Binary Protections&amp;lt;/center&amp;gt;||year=2014}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|Medium}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|Common}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|Easy}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|Severe}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Typically, an adversary will analyze and reverse engineer a mobile app's code, then modify it to perform some hidden functionality.&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;An adversary will use an automated tool to reverse engineer the code and modify it using malware to perform some hidden functionality.&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;'''Prevalence'''&lt;br /&gt;
A lack of binary protections within a mobile app exposes the application and it’s owner to a large variety of technical and business risks if the underlying application is insecure or exposes sensitive intellectual property.  A lack of binary protections results in a mobile app that can be analyzed, reverse-engineered, and modified by an adversary in rapid fashion. However, an application with binary protection can still be reversed by a dedicated adversary and therefor binary protection is not a perfect security solution. At the end of the day, binary protection only slows down a security review. &lt;br /&gt;
&lt;br /&gt;
It is extremely common for apps to be deployed without binary protection. The prevalence has been extensively studied by a large number of security vendors, analysts, and researchers &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem1|1]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem2|2]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem3|3]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem17|17]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
'''Detectability'''&lt;br /&gt;
&lt;br /&gt;
It is difficult to detect that an adversary has reverse engineered an app’s code.  Typically, the app owner will realize reverse engineering was successful when the code shows up in another app in iTunes &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem4|4]]&amp;amp;#93;&amp;lt;/sup&amp;gt;, Google Play &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem5|5]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem16|16]]&amp;amp;#93;&amp;lt;/sup&amp;gt;, or a third-party app store &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem6|6]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.  Usually, the owner discovers this by accident and not through active policing by an app store.&lt;br /&gt;
&lt;br /&gt;
There are many different viable solutions to detect code modification at runtime and respond accordingly.  At runtime, mobile apps should be enabled to detect if a runtime modification / injection has occurred and react in a number of different ways.  Pre-determined reactions of the apps will vary from either attempting to thwart the attack or fail in a subtle way &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem7|7]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;The majority of mobile apps do not prevent an adversary from successfully analyzing, reverse engineering or modifying the app’s binary code &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem1|1]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.  Organizations should apply binary protections to a mobile app under a few different circumstances:&lt;br /&gt;
&lt;br /&gt;
'''Analysis and Reverse Engineering'''&lt;br /&gt;
&lt;br /&gt;
Binary protections slow down an adversary from analyzing exposed interfaces and reverse engineering code within the mobile app.  All too often, the adversary will steal code and recycle it within another app for resell &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem16|16]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.  The app owner is often unaware that the app has been repurposed and sold elsewhere unless they utilize some form of appstore monitoring service or similar.  If there is a likely chance that this may occur, the owner should consider binary protections to the app. But be warned, this protection only slows an attacker from reverse engineering. It does not prevent an attacker from doing so.&lt;br /&gt;
&lt;br /&gt;
'''Unauthorized Code Modification'''&lt;br /&gt;
&lt;br /&gt;
Binary protections slow an adversary from modifying the underlying code or behavior to disable or add additional functionality on behalf of the adversary.  This is likely to occur if the app stores, transmits, or processes personally identifiable information (PII) or other sensitive information assets like passwords or credit cards.  Code modification often takes the form of repackaging or insertion of malware into existing mobile apps &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem3|3]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem18|18]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Typically, a lack of binary protection will result in the following business impacts:&lt;br /&gt;
&lt;br /&gt;
* Privacy Related and Confidential Data Theft;&lt;br /&gt;
* Unauthorized Access and Fraud;&lt;br /&gt;
* Brand and Trust Damage;&lt;br /&gt;
* Revenue Loss and Piracy;&lt;br /&gt;
* Intellectual Property Theft;&lt;br /&gt;
* User Experience Compromise.&lt;br /&gt;
&lt;br /&gt;
Many different analysts have provided policy guidance around minimizing this risk &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem8|8]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem9|9]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem10|10]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem11|11]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem12|12]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|Am I Vulnerable to Lack of Binary Protections?||year=2014}}&lt;br /&gt;
&lt;br /&gt;
If you are hosting code in an untrustworthy environment, you are susceptible to this risk &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem1|1]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem2|2]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem3|3]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem17|17]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.  An untrustworthy environment is defined as an environment in which the organization does not have physical control.  This includes mobile clients, firmware in appliances, cloud spaces, or datacenters within particular countries.&lt;br /&gt;
&lt;br /&gt;
If you answer yes to any of these questions, you are vulnerable to a binary attack:&lt;br /&gt;
&lt;br /&gt;
:* Can someone code-decrypt this app (iPhone specific) using an automated tool like ClutchMod or manually using GDB? &lt;br /&gt;
&lt;br /&gt;
:* Can someone reverse engineer this app (Android specific) using an automated tool like dex2jar?&lt;br /&gt;
&lt;br /&gt;
:* Can someone use an automated tool like Hopper or IDA Pro to easily visualize the control-flow and pseudo-code of this app?&lt;br /&gt;
&lt;br /&gt;
:* Can someone modify the app’s presentation layer (HTML/JS/CSS) of this app within the phone and execute modified JavaScript?&lt;br /&gt;
&lt;br /&gt;
:* Can someone modify the app’s binary executable using a hex editor to get it to bypass a security control?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|How Do I Prevent Lack of Binary Protections?||year=2014}}&lt;br /&gt;
&lt;br /&gt;
First, the application must follow secure coding techniques for the following security components within the mobile app:&lt;br /&gt;
&lt;br /&gt;
:* Jailbreak Detection Controls;&lt;br /&gt;
:* Checksum Controls;&lt;br /&gt;
:* Certificate Pinning Controls;&lt;br /&gt;
:* Debugger Detection Controls.&lt;br /&gt;
&lt;br /&gt;
Next, the app must adequately mitigate two different technical risks that the above controls are exposed to:&lt;br /&gt;
&lt;br /&gt;
:# The organization building the app must adequately prevent an adversary from analyzing and reverse engineering the app using static or dynamic analysis techniques;&lt;br /&gt;
:# The mobile app must be able to detect at runtime that code has been added or changed from what it knows about its integrity at compile time.  The app must be able to react appropriately at runtime to a code integrity violation.&lt;br /&gt;
&lt;br /&gt;
The remediation strategies for these types of risks are outlined in more technical detail within the [https://www.owasp.org/index.php/Technical_Risks_of_Reverse_Engineering_and_Unauthorized_Code_Modification OWASP Reverse Engineering and Code Modification Prevention Project].&lt;br /&gt;
&lt;br /&gt;
'''Android Specific Best Practices:'''&lt;br /&gt;
&lt;br /&gt;
'''Android Root Detection'''&lt;br /&gt;
&lt;br /&gt;
There are a few common ways to detect a rooted Android device:&amp;lt;br&amp;gt;&lt;br /&gt;
Check for test-keys&lt;br /&gt;
:* Check to see if &amp;lt;tt&amp;gt;build.prop&amp;lt;/tt&amp;gt; includes the line ''ro.build.tags=test-keys'' indicating a developer build or unofficial ROM&lt;br /&gt;
Check for OTA certificates&lt;br /&gt;
:* Check to see if the file ''/etc/security/otacerts.zip'' exists&lt;br /&gt;
Check for several known rooted apk's&lt;br /&gt;
:* com.noshufou.android.su&lt;br /&gt;
:* com.thirdparty.superuser&lt;br /&gt;
:* eu.chainfire.supersu&lt;br /&gt;
:* com.koushikdutta.superuser&lt;br /&gt;
Check for SU binaries&lt;br /&gt;
:* &amp;lt;tt&amp;gt;/system/bin/su&amp;lt;/tt&amp;gt;&lt;br /&gt;
:* &amp;lt;tt&amp;gt;/system/xbin/su&amp;lt;/tt&amp;gt;&lt;br /&gt;
:* &amp;lt;tt&amp;gt;/sbin/su&amp;lt;/tt&amp;gt;&lt;br /&gt;
:* &amp;lt;tt&amp;gt;/system/su&amp;lt;/tt&amp;gt;&lt;br /&gt;
:* &amp;lt;tt&amp;gt;/system/bin/.ext/.su&amp;lt;/tt&amp;gt;&lt;br /&gt;
Attempt SU command directly&lt;br /&gt;
:* Attempt the to run the command &amp;lt;tt&amp;gt;su&amp;lt;/tt&amp;gt; and check the id of the current user, if it returns 0 then the su command has been successful&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=3|risk=7}}&lt;br /&gt;
This section outlines typical app vulnerabilities that result from a lack of binary protection.  Items within parenthesis indicate examples of tools you can use to test for these vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==iOS Apps==&lt;br /&gt;
&lt;br /&gt;
:* Disabling Code Encryption (''ClutchMod'');&lt;br /&gt;
:* Jailbreak Detection Evasion (''xcon'');&lt;br /&gt;
:* Class Dumping (''class-dump-z'');&lt;br /&gt;
:* Method Swizzling (''Mobile Substrate'');&lt;br /&gt;
:* Runtime Code Injection (''cycript'');&lt;br /&gt;
:* Runtime Monitoring (''Snoop-It'');&lt;br /&gt;
:* Runtime Analysis (''GDB''); and&lt;br /&gt;
:* Reverse Engineering (''[https://www.hex-rays.com/products/ida/ IDA Pro]; Hopper'').&lt;br /&gt;
&lt;br /&gt;
== Android Apps==&lt;br /&gt;
&lt;br /&gt;
:* Bytecode Conversion (''apktool; dex2jar'');&lt;br /&gt;
:* Runtime Analysis (''ADB'');&lt;br /&gt;
:* Reverse Engineering (''[https://www.hex-rays.com/products/ida/ IDA Pro]; Hopper'');&lt;br /&gt;
:* Disassembly (''baksmali'') and&lt;br /&gt;
:* Code Injection (''Mobile Substrate'').&lt;br /&gt;
&lt;br /&gt;
== Windows Phone Apps==&lt;br /&gt;
&lt;br /&gt;
:* .NET Decompiler (''[https://www.jetbrains.com/decompiler/ JetBrains dotPeak]; [http://ilspy.net/ ILSpy]; [http://www.red-gate.com/products/dotnet-development/reflector/ RedGate .NET Reflector] '');&lt;br /&gt;
:* Runtime Analysis (''[https://github.com/andreycha/tangerine Tangerine]; [https://github.com/sensepost/xapspy XAPSpy]'');&lt;br /&gt;
:* Reverse Engineering (''[https://www.hex-rays.com/products/ida/ IDA Pro]'');&lt;br /&gt;
:* Disassembly (''[https://msdn.microsoft.com/en-us/library/f7dy01k1%28v=vs.110%29.aspx MSIL Disassembler (Ildasm.exe)]'') and&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are many well-established security experts within the mobile space that have written books on the topic of binary protection testing &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem13|13]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem14|14]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem15|15]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=7}}&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem1&amp;quot;&amp;gt;[1] Arxan Research: [https://www.arxan.com/assets/1/7/State_of_Security_in_the_App_Economy_Report_Vol._2.pdf State of Security in the App Economy, Volume 2], November 2013:&lt;br /&gt;
:''“Adversaries have hacked 78 percent of the top 100 paid Android and iOS apps in 2013.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem2&amp;quot;&amp;gt;[2] HP Research: [http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865#.UuwZFPZvDi5 HP Research Reveals Nine out of 10 Mobile Applications Vulnerable to Attack], 18 November 2013:&lt;br /&gt;
:''&amp;quot;86 percent of applications tested lacked binary hardening, leaving applications vulnerable to information disclosure, buffer overflows and poor performance. To ensure security throughout the life cycle of the application, it is essential to build in the best security practices from conception.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem3&amp;quot;&amp;gt;[3] North Carolina State University: [http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND12.pdf Dissecting Android Malware: Characterization and Evolution], 7 September 2011:&lt;br /&gt;
:''“Our results show that 86.0% of them (Android Malware) repackage legitimate apps to include malicious payloads; 36.7% contain platform-level exploits to escalate privilege; 93.0% exhibit the bot-like capability.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem4&amp;quot;&amp;gt;[4] Tech Hive: [http://www.techhive.com/article/249310/apple_pulls_ripoff_apps_from_its_walled_garden.html Apple Pulls Ripoff Apps from its Walled Garden]Feb 4th, 2012:&lt;br /&gt;
:''“While Apple is known for screening apps before they are allowed to sprout up in its walled garden, clearly fake apps do get in. Once they do, getting them out depends on developers who raise a fuss.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem5&amp;quot;&amp;gt;[5] Tech Crunch: [http://techcrunch.com/2014/01/02/developer-spams-google-play-with-ripoffs-of-well-known-apps-again/ Developer Spams Google Play With RipOffs of Well-Known Apps… Again], January 2 2014:&lt;br /&gt;
:''“It’s not uncommon to search the Google Play app store and find a number of knock-off or “fake” apps aiming to trick unsuspecting searchers into downloading them over the real thing.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem6&amp;quot;&amp;gt;[6] Extreme Tech: [http://www.extremetech.com/mobile/153849-chinese-app-store-offers-pirated-ios-apps-without-the-need-to-jailbreak Chinese App Store Offers Pirated iOS Apps Without the Need To Jailbreak], April 19 2013:&lt;br /&gt;
:''“The site offers apps for free that would otherwise cost money, including big-name titles.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem7&amp;quot;&amp;gt;[7] OWASP: [https://www.owasp.org/index.php/Architectural_Principles_That_Prevent_Code_Modification_or_Reverse_Engineering Architectural Principles That Prevent Code Modification or Reverse Engineering], January 11th 2014.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem8&amp;quot;&amp;gt;[8] Gartner report: Avoiding Mobile App Development Security Pitfalls, 24 May 2013:&lt;br /&gt;
:''&amp;quot;For critical applications, such as transactional ones and sensitive enterprise applications, hardening should be used.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem9&amp;quot;&amp;gt;[9] Gartner report: Emerging Technology Analysis:  Mobile Application Shielding, March 26th, 2013:&lt;br /&gt;
:''&amp;quot;As more regulated and sensitive data applications move to mobile platforms the need to increase data protection increases. Mobile application shielding presents the opportunity to security providers to offer higher data protection standards to mobile platforms that exceed mobile OS security.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem10&amp;quot;&amp;gt;[10] Gartner report: Proliferating Mobile Transaction Attack Vectors and What to Do About Them, March 1st, 2013:&lt;br /&gt;
:''&amp;quot;Use mobile application security testing services and self-defending application utilities to help prevent hacking attempts.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem11&amp;quot;&amp;gt;[11] Gartner report: Select a Secure Mobile Wallet for Proximity, March 1st, 2013:&lt;br /&gt;
:''&amp;quot;Application hardening can fortify sensitive business code against hacking attempts, such as reverse engineering”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem12&amp;quot;&amp;gt;[12] Forrester paper: Choose The Right Mobile Development Solutions For Your Organization, May 6th 2013:&lt;br /&gt;
:''“5 Key Protections: Data Protection, App Compliance, App-Level Threat Defense, Security Policy Enforcement, App Integrity”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem13&amp;quot;&amp;gt;[13] John Wiley and Sons, Inc: [http://www.amazon.com/iOS-Hackers-Handbook-Charlie-Miller/dp/1118204123 iOS Hacker's Handbook], Published May 2012, ISBN 1118204123.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem14&amp;quot;&amp;gt;[14] McGraw Hill Education: [http://mobilehackingexposed.com/ Mobile Hacking Exposed], Published July 2013, ISBN 0071817018.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem15&amp;quot;&amp;gt;[15] Publisher Unannounced: [http://www.amazon.com/Android-Hackers-Handbook-Joshua-Drake/dp/111860864X Android Hacker's Handbook], To Be Published April 2014.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem16&amp;quot;&amp;gt;[16] Software Development Times: [http://sdt.bz/66393#ixzz2sHa7dFMp More than 5,000 apps in the Google Play Store are copied APKs, or 'thief-ware'], November 20 2013:&lt;br /&gt;
:''“In most cases, the 2,140 copycat developers that were found reassembled the apps almost identically, adding new advertising SDKs to siphon profits away from the original developers.''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem17&amp;quot;&amp;gt;[17] InfoSecurity Magazine: [http://www.infosecurity-magazine.com/view/36376/two-thirds-of-personal-banking-apps-found-full-of-vulnerabilities/ Two Thirds of Personal Banking Apps Found Full of Vulnerabilities], January 3 2014:&lt;br /&gt;
:''“But one of his more worrying findings came from disassembling the apps themselves ... what he found was hardcoded development credentials within the code. An attacker could gain access to the development infrastructure of the bank and infest the application with malware causing a massive infection for all of the application’s users.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem18&amp;quot;&amp;gt;[18] InfoSecurity Magazine: [http://www.infosecurity-magazine.com/view/36686/mobile-malware-infects-millions-lte-spurs-growth/ Mobile Malware Infects Millions; LTE Spurs Growth], January 29 2014:&lt;br /&gt;
:''&amp;quot;Number of mobile malware samples is growing at a rapid clip, increasing by 20-fold in 2013... It is trivial for an attacker to hijack a legitimate Android application, inject malware into it and redistribute it for consumption. There are now binder kits available that will allow an attacker to automatically inject malware into an existing application&amp;quot;''&amp;lt;/span&amp;gt;&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M10&amp;diff=191777</id>
		<title>Mobile Top 10 2014-M10</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Mobile_Top_10_2014-M10&amp;diff=191777"/>
				<updated>2015-03-19T17:51:56Z</updated>
		
		<summary type="html">&lt;p&gt;Andipannell: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/Projects/OWASP_Mobile_Security_Project_-_Top_Ten_Mobile_Risks Back To The Mobile Top Ten Main Page]&amp;lt;/center&amp;gt;&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|&amp;lt;center&amp;gt;Lack of Binary Protections&amp;lt;/center&amp;gt;||year=2014}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderBeginTemplate}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Exploitability|Medium}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Prevalence|Common}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-2-Template|Detectability|Easy}}&lt;br /&gt;
{{Top_10_2010:SummaryTableValue-1-Template|Impact|Severe}}&lt;br /&gt;
{{Top_10_2010:SummaryTableHeaderEndTemplate}}&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Typically, an adversary will analyze and reverse engineer a mobile app's code, then modify it to perform some hidden functionality.&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;An adversary will use an automated tool to reverse engineer the code and modify it using malware to perform some hidden functionality.&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td colspan=2  {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;'''Prevalence'''&lt;br /&gt;
A lack of binary protections within a mobile app exposes the application and it’s owner to a large variety of technical and business risks if the underlying application is insecure or exposes sensitive intellectual property.  A lack of binary protections results in a mobile app that can be analyzed, reverse-engineered, and modified by an adversary in rapid fashion. However, an application with binary protection can still be reversed by a dedicated adversary and therefor binary protection is not a perfect security solution. At the end of the day, binary protection only slows down a security review. &lt;br /&gt;
&lt;br /&gt;
It is extremely common for apps to be deployed without binary protection. The prevalence has been extensively studied by a large number of security vendors, analysts, and researchers &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem1|1]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem2|2]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem3|3]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem17|17]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
'''Detectability'''&lt;br /&gt;
&lt;br /&gt;
It is difficult to detect that an adversary has reverse engineered an app’s code.  Typically, the app owner will realize reverse engineering was successful when the code shows up in another app in iTunes &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem4|4]]&amp;amp;#93;&amp;lt;/sup&amp;gt;, Google Play &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem5|5]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem16|16]]&amp;amp;#93;&amp;lt;/sup&amp;gt;, or a third-party app store &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem6|6]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.  Usually, the owner discovers this by accident and not through active policing by an app store.&lt;br /&gt;
&lt;br /&gt;
There are many different viable solutions to detect code modification at runtime and respond accordingly.  At runtime, mobile apps should be enabled to detect if a runtime modification / injection has occurred and react in a number of different ways.  Pre-determined reactions of the apps will vary from either attempting to thwart the attack or fail in a subtle way &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem7|7]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;The majority of mobile apps do not prevent an adversary from successfully analyzing, reverse engineering or modifying the app’s binary code &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem1|1]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.  Organizations should apply binary protections to a mobile app under a few different circumstances:&lt;br /&gt;
&lt;br /&gt;
'''Analysis and Reverse Engineering'''&lt;br /&gt;
&lt;br /&gt;
Binary protections slow down an adversary from analyzing exposed interfaces and reverse engineering code within the mobile app.  All too often, the adversary will steal code and recycle it within another app for resell &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem16|16]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.  The app owner is often unaware that the app has been repurposed and sold elsewhere unless they utilize some form of appstore monitoring service or similar.  If there is a likely chance that this may occur, the owner should consider binary protections to the app. But be warned, this protection only slows an attacker from reverse engineering. It does not prevent an attacker from doing so.&lt;br /&gt;
&lt;br /&gt;
'''Unauthorized Code Modification'''&lt;br /&gt;
&lt;br /&gt;
Binary protections slow an adversary from modifying the underlying code or behavior to disable or add additional functionality on behalf of the adversary.  This is likely to occur if the app stores, transmits, or processes personally identifiable information (PII) or other sensitive information assets like passwords or credit cards.  Code modification often takes the form of repackaging or insertion of malware into existing mobile apps &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem3|3]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem18|18]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
     &amp;lt;td {{Template:Top 10 2010:SummaryTableRowStyleTemplate}}&amp;gt;Typically, a lack of binary protection will result in the following business impacts:&lt;br /&gt;
&lt;br /&gt;
* Privacy Related and Confidential Data Theft;&lt;br /&gt;
* Unauthorized Access and Fraud;&lt;br /&gt;
* Brand and Trust Damage;&lt;br /&gt;
* Revenue Loss and Piracy;&lt;br /&gt;
* Intellectual Property Theft;&lt;br /&gt;
* User Experience Compromise.&lt;br /&gt;
&lt;br /&gt;
Many different analysts have provided policy guidance around minimizing this risk &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem8|8]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem9|9]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem10|10]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem11|11]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem12|12]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SummaryTableEndTemplate}}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|Am I Vulnerable to Lack of Binary Protections?||year=2014}}&lt;br /&gt;
&lt;br /&gt;
If you are hosting code in an untrustworthy environment, you are susceptible to this risk &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem1|1]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem2|2]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem3|3]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem17|17]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.  An untrustworthy environment is defined as an environment in which the organization does not have physical control.  This includes mobile clients, firmware in appliances, cloud spaces, or datacenters within particular countries.&lt;br /&gt;
&lt;br /&gt;
If you answer yes to any of these questions, you are vulnerable to a binary attack:&lt;br /&gt;
&lt;br /&gt;
:* Can someone code-decrypt this app (iPhone specific) using an automated tool like ClutchMod or manually using GDB?&lt;br /&gt;
&lt;br /&gt;
:* Can someone use an automated tool like Hopper or IDA Pro to easily visualize the control-flow and pseudo-code of this app?&lt;br /&gt;
&lt;br /&gt;
:* Can someone modify the app’s presentation layer (HTML/JS/CSS) of this app within the phone and execute modified JavaScript?&lt;br /&gt;
&lt;br /&gt;
:* Can someone modify the app’s binary executable using a hex editor to get it to bypass a security control?&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Top_10_2010:SubsectionColoredTemplate|How Do I Prevent Lack of Binary Protections?||year=2014}}&lt;br /&gt;
&lt;br /&gt;
First, the application must follow secure coding techniques for the following security components within the mobile app:&lt;br /&gt;
&lt;br /&gt;
:* Jailbreak Detection Controls;&lt;br /&gt;
:* Checksum Controls;&lt;br /&gt;
:* Certificate Pinning Controls;&lt;br /&gt;
:* Debugger Detection Controls.&lt;br /&gt;
&lt;br /&gt;
Next, the app must adequately mitigate two different technical risks that the above controls are exposed to:&lt;br /&gt;
&lt;br /&gt;
:# The organization building the app must adequately prevent an adversary from analyzing and reverse engineering the app using static or dynamic analysis techniques;&lt;br /&gt;
:# The mobile app must be able to detect at runtime that code has been added or changed from what it knows about its integrity at compile time.  The app must be able to react appropriately at runtime to a code integrity violation.&lt;br /&gt;
&lt;br /&gt;
The remediation strategies for these types of risks are outlined in more technical detail within the [https://www.owasp.org/index.php/Technical_Risks_of_Reverse_Engineering_and_Unauthorized_Code_Modification OWASP Reverse Engineering and Code Modification Prevention Project].&lt;br /&gt;
&lt;br /&gt;
'''Android Specific Best Practices:'''&lt;br /&gt;
&lt;br /&gt;
'''Android Root Detection'''&lt;br /&gt;
&lt;br /&gt;
There are a few common ways to detect a rooted Android device:&amp;lt;br&amp;gt;&lt;br /&gt;
Check for test-keys&lt;br /&gt;
:* Check to see if &amp;lt;tt&amp;gt;build.prop&amp;lt;/tt&amp;gt; includes the line ''ro.build.tags=test-keys'' indicating a developer build or unofficial ROM&lt;br /&gt;
Check for OTA certificates&lt;br /&gt;
:* Check to see if the file ''/etc/security/otacerts.zip'' exists&lt;br /&gt;
Check for several known rooted apk's&lt;br /&gt;
:* com.noshufou.android.su&lt;br /&gt;
:* com.thirdparty.superuser&lt;br /&gt;
:* eu.chainfire.supersu&lt;br /&gt;
:* com.koushikdutta.superuser&lt;br /&gt;
Check for SU binaries&lt;br /&gt;
:* &amp;lt;tt&amp;gt;/system/bin/su&amp;lt;/tt&amp;gt;&lt;br /&gt;
:* &amp;lt;tt&amp;gt;/system/xbin/su&amp;lt;/tt&amp;gt;&lt;br /&gt;
:* &amp;lt;tt&amp;gt;/sbin/su&amp;lt;/tt&amp;gt;&lt;br /&gt;
:* &amp;lt;tt&amp;gt;/system/su&amp;lt;/tt&amp;gt;&lt;br /&gt;
:* &amp;lt;tt&amp;gt;/system/bin/.ext/.su&amp;lt;/tt&amp;gt;&lt;br /&gt;
Attempt SU command directly&lt;br /&gt;
:* Attempt the to run the command &amp;lt;tt&amp;gt;su&amp;lt;/tt&amp;gt; and check the id of the current user, if it returns 0 then the su command has been successful&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=3|risk=7}}&lt;br /&gt;
This section outlines typical app vulnerabilities that result from a lack of binary protection.  Items within parenthesis indicate examples of tools you can use to test for these vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
==iOS Apps==&lt;br /&gt;
&lt;br /&gt;
:* Disabling Code Encryption (''ClutchMod'');&lt;br /&gt;
:* Jailbreak Detection Evasion (''xcon'');&lt;br /&gt;
:* Class Dumping (''class-dump-z'');&lt;br /&gt;
:* Method Swizzling (''Mobile Substrate'');&lt;br /&gt;
:* Runtime Code Injection (''cycript'');&lt;br /&gt;
:* Runtime Monitoring (''Snoop-It'');&lt;br /&gt;
:* Runtime Analysis (''GDB''); and&lt;br /&gt;
:* Reverse Engineering (''[https://www.hex-rays.com/products/ida/ IDA Pro]; Hopper'').&lt;br /&gt;
&lt;br /&gt;
== Android Apps==&lt;br /&gt;
&lt;br /&gt;
:* Bytecode Conversion (''apktool; dex2jar'');&lt;br /&gt;
:* Runtime Analysis (''ADB'');&lt;br /&gt;
:* Reverse Engineering (''[https://www.hex-rays.com/products/ida/ IDA Pro]; Hopper'');&lt;br /&gt;
:* Disassembly (''baksmali'') and&lt;br /&gt;
:* Code Injection (''Mobile Substrate'').&lt;br /&gt;
&lt;br /&gt;
== Windows Phone Apps==&lt;br /&gt;
&lt;br /&gt;
:* .NET Decompiler (''[https://www.jetbrains.com/decompiler/ JetBrains dotPeak]; [http://ilspy.net/ ILSpy]; [http://www.red-gate.com/products/dotnet-development/reflector/ RedGate .NET Reflector] '');&lt;br /&gt;
:* Runtime Analysis (''[https://github.com/andreycha/tangerine Tangerine]; [https://github.com/sensepost/xapspy XAPSpy]'');&lt;br /&gt;
:* Reverse Engineering (''[https://www.hex-rays.com/products/ida/ IDA Pro]'');&lt;br /&gt;
:* Disassembly (''[https://msdn.microsoft.com/en-us/library/f7dy01k1%28v=vs.110%29.aspx MSIL Disassembler (Ildasm.exe)]'') and&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There are many well-established security experts within the mobile space that have written books on the topic of binary protection testing &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem13|13]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem14|14]]&amp;amp;#93;&amp;lt;/sup&amp;gt; &amp;lt;sup&amp;gt;&amp;amp;#91;[[#ReferenceItem15|15]]&amp;amp;#93;&amp;lt;/sup&amp;gt;.&lt;br /&gt;
&lt;br /&gt;
{{Mobile_Top_10_2012:SubsectionAdvancedTemplate|type={{Mobile_Top_10_2012:StyleTemplate}}|number=4|risk=7}}&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem1&amp;quot;&amp;gt;[1] Arxan Research: [https://www.arxan.com/assets/1/7/State_of_Security_in_the_App_Economy_Report_Vol._2.pdf State of Security in the App Economy, Volume 2], November 2013:&lt;br /&gt;
:''“Adversaries have hacked 78 percent of the top 100 paid Android and iOS apps in 2013.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem2&amp;quot;&amp;gt;[2] HP Research: [http://www8.hp.com/us/en/hp-news/press-release.html?id=1528865#.UuwZFPZvDi5 HP Research Reveals Nine out of 10 Mobile Applications Vulnerable to Attack], 18 November 2013:&lt;br /&gt;
:''&amp;quot;86 percent of applications tested lacked binary hardening, leaving applications vulnerable to information disclosure, buffer overflows and poor performance. To ensure security throughout the life cycle of the application, it is essential to build in the best security practices from conception.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem3&amp;quot;&amp;gt;[3] North Carolina State University: [http://www.csc.ncsu.edu/faculty/jiang/pubs/OAKLAND12.pdf Dissecting Android Malware: Characterization and Evolution], 7 September 2011:&lt;br /&gt;
:''“Our results show that 86.0% of them (Android Malware) repackage legitimate apps to include malicious payloads; 36.7% contain platform-level exploits to escalate privilege; 93.0% exhibit the bot-like capability.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem4&amp;quot;&amp;gt;[4] Tech Hive: [http://www.techhive.com/article/249310/apple_pulls_ripoff_apps_from_its_walled_garden.html Apple Pulls Ripoff Apps from its Walled Garden]Feb 4th, 2012:&lt;br /&gt;
:''“While Apple is known for screening apps before they are allowed to sprout up in its walled garden, clearly fake apps do get in. Once they do, getting them out depends on developers who raise a fuss.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem5&amp;quot;&amp;gt;[5] Tech Crunch: [http://techcrunch.com/2014/01/02/developer-spams-google-play-with-ripoffs-of-well-known-apps-again/ Developer Spams Google Play With RipOffs of Well-Known Apps… Again], January 2 2014:&lt;br /&gt;
:''“It’s not uncommon to search the Google Play app store and find a number of knock-off or “fake” apps aiming to trick unsuspecting searchers into downloading them over the real thing.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem6&amp;quot;&amp;gt;[6] Extreme Tech: [http://www.extremetech.com/mobile/153849-chinese-app-store-offers-pirated-ios-apps-without-the-need-to-jailbreak Chinese App Store Offers Pirated iOS Apps Without the Need To Jailbreak], April 19 2013:&lt;br /&gt;
:''“The site offers apps for free that would otherwise cost money, including big-name titles.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem7&amp;quot;&amp;gt;[7] OWASP: [https://www.owasp.org/index.php/Architectural_Principles_That_Prevent_Code_Modification_or_Reverse_Engineering Architectural Principles That Prevent Code Modification or Reverse Engineering], January 11th 2014.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem8&amp;quot;&amp;gt;[8] Gartner report: Avoiding Mobile App Development Security Pitfalls, 24 May 2013:&lt;br /&gt;
:''&amp;quot;For critical applications, such as transactional ones and sensitive enterprise applications, hardening should be used.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem9&amp;quot;&amp;gt;[9] Gartner report: Emerging Technology Analysis:  Mobile Application Shielding, March 26th, 2013:&lt;br /&gt;
:''&amp;quot;As more regulated and sensitive data applications move to mobile platforms the need to increase data protection increases. Mobile application shielding presents the opportunity to security providers to offer higher data protection standards to mobile platforms that exceed mobile OS security.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem10&amp;quot;&amp;gt;[10] Gartner report: Proliferating Mobile Transaction Attack Vectors and What to Do About Them, March 1st, 2013:&lt;br /&gt;
:''&amp;quot;Use mobile application security testing services and self-defending application utilities to help prevent hacking attempts.&amp;quot;''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem11&amp;quot;&amp;gt;[11] Gartner report: Select a Secure Mobile Wallet for Proximity, March 1st, 2013:&lt;br /&gt;
:''&amp;quot;Application hardening can fortify sensitive business code against hacking attempts, such as reverse engineering”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem12&amp;quot;&amp;gt;[12] Forrester paper: Choose The Right Mobile Development Solutions For Your Organization, May 6th 2013:&lt;br /&gt;
:''“5 Key Protections: Data Protection, App Compliance, App-Level Threat Defense, Security Policy Enforcement, App Integrity”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem13&amp;quot;&amp;gt;[13] John Wiley and Sons, Inc: [http://www.amazon.com/iOS-Hackers-Handbook-Charlie-Miller/dp/1118204123 iOS Hacker's Handbook], Published May 2012, ISBN 1118204123.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem14&amp;quot;&amp;gt;[14] McGraw Hill Education: [http://mobilehackingexposed.com/ Mobile Hacking Exposed], Published July 2013, ISBN 0071817018.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem15&amp;quot;&amp;gt;[15] Publisher Unannounced: [http://www.amazon.com/Android-Hackers-Handbook-Joshua-Drake/dp/111860864X Android Hacker's Handbook], To Be Published April 2014.&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem16&amp;quot;&amp;gt;[16] Software Development Times: [http://sdt.bz/66393#ixzz2sHa7dFMp More than 5,000 apps in the Google Play Store are copied APKs, or 'thief-ware'], November 20 2013:&lt;br /&gt;
:''“In most cases, the 2,140 copycat developers that were found reassembled the apps almost identically, adding new advertising SDKs to siphon profits away from the original developers.''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem17&amp;quot;&amp;gt;[17] InfoSecurity Magazine: [http://www.infosecurity-magazine.com/view/36376/two-thirds-of-personal-banking-apps-found-full-of-vulnerabilities/ Two Thirds of Personal Banking Apps Found Full of Vulnerabilities], January 3 2014:&lt;br /&gt;
:''“But one of his more worrying findings came from disassembling the apps themselves ... what he found was hardcoded development credentials within the code. An attacker could gain access to the development infrastructure of the bank and infest the application with malware causing a massive infection for all of the application’s users.”''&amp;lt;/span&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;span id=&amp;quot;ReferenceItem18&amp;quot;&amp;gt;[18] InfoSecurity Magazine: [http://www.infosecurity-magazine.com/view/36686/mobile-malware-infects-millions-lte-spurs-growth/ Mobile Malware Infects Millions; LTE Spurs Growth], January 29 2014:&lt;br /&gt;
:''&amp;quot;Number of mobile malware samples is growing at a rapid clip, increasing by 20-fold in 2013... It is trivial for an attacker to hijack a legitimate Android application, inject malware into it and redistribute it for consumption. There are now binder kits available that will allow an attacker to automatically inject malware into an existing application&amp;quot;''&amp;lt;/span&amp;gt;&lt;/div&gt;</summary>
		<author><name>Andipannell</name></author>	</entry>

	</feed>