<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andrew+Wilson</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Andrew+Wilson"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Andrew_Wilson"/>
		<updated>2026-05-06T12:55:24Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=85710</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=85710"/>
				<updated>2010-07-01T03:44:06Z</updated>
		
		<summary type="html">&lt;p&gt;Andrew Wilson: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:peteroalofs@gmail.com Pete Roalofs] and [mailto:a.wilson82@gmail.com Andrew Wilson]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
2010 Meetings&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix is running our 2010 meetings at the following time and location.&lt;br /&gt;
&lt;br /&gt;
Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour. &lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun. &lt;br /&gt;
&lt;br /&gt;
The meetings are now being hosted at University of Advanced Technology&lt;br /&gt;
&lt;br /&gt;
The location is:&lt;br /&gt;
&lt;br /&gt;
University of Advancing Technology&lt;br /&gt;
2625 W. BASELINE RD.&lt;br /&gt;
TEMPE, AZ 85283-1056&lt;br /&gt;
&lt;br /&gt;
== JULY MEETING INFO - TUES July 6th 2010 6:30 PM  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix invites you to it's July meeting!&lt;br /&gt;
&lt;br /&gt;
Tuesday July 1st 2010 6:30 - 7:30 PM at University of Advancing Technology &lt;br /&gt;
The meetings are always free, unfortunately the drinks aren't.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;This month's meeting:&amp;lt;/b&amp;gt;&lt;br /&gt;
* Updates and Discussion&lt;br /&gt;
* &amp;lt;i&amp;gt;masSEXploitation&amp;lt;/i&amp;gt;, Mike Brooks&amp;lt;br /&amp;gt;&lt;br /&gt;
**This talk covers the use of chaining vulnerabilities in order to bypass layered security systems.  This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform.  These attacks where developed by me,  and they are very new.   These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
* Bio:&lt;br /&gt;
** I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken.  According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook).  I actively hunt for vulnerabilities on a verity of platforms.  I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Drinks will be found afterword at Doc &amp;amp; Eddies.&lt;br /&gt;
&lt;br /&gt;
Doc &amp;amp; Eddy's, 909 East Minton Drive, Tempe, AZ 85282-7021&lt;br /&gt;
&lt;br /&gt;
== 2010 Meetings Calendar ==&lt;br /&gt;
This calendar will likely be updated on month to month basis. In absence of a speaker for a monthly meeting we will opt for a short discussion.&lt;br /&gt;
&lt;br /&gt;
* July - Michael Brooks&lt;br /&gt;
* August - TBD&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]'''&lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.  We currently hold meetings every month, typically with one or two speakers at each meeting.  &lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see? ==&lt;br /&gt;
&amp;lt;b&amp;gt;Please Update&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Certificates&amp;lt;br/&amp;gt;&lt;br /&gt;
* Application Firewalls&amp;lt;br/&amp;gt;&lt;br /&gt;
* PHP&amp;lt;br/&amp;gt;&lt;br /&gt;
* Security ROI&amp;lt;br/&amp;gt;&lt;br /&gt;
* Penetration Testing Methods&amp;lt;br/&amp;gt;&lt;br /&gt;
* AJAX&amp;lt;br/&amp;gt;&lt;br /&gt;
* Cryptography in Web Applications&amp;lt;br/&amp;gt;&lt;br /&gt;
* Reversing ActiveX controls&amp;lt;br/&amp;gt;&lt;br /&gt;
* Using Local Proxies&amp;lt;br/&amp;gt;&lt;br /&gt;
* Browser Safety / Security&amp;lt;br/&amp;gt;&lt;br /&gt;
* Web services security: XML/SOAP/WSDL&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br/ &amp;gt;&lt;br /&gt;
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript).  It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;.  It was designed to protect browsers from executing code from external websites, which could be malicious.&lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy.  DNS Pinning didn't pan out exactly right, either.  Can client-side scripting allow malicious code to get into your browser history and cache?  Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer?  Can it access and modify files on your local hard drive or other connected filesystems?  Can client-side scripts be used to access and control everything you access online?  Can it be used to scan and attack your Intranet / local network?  Does an attacker have to target you in order to pull off one of these attacks successfully?  If I turn off Javascript or use NoScript, am I safe?  What other trust relationships does the web application n-Tier model break?&lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications.  Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch]&lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Andrew Wilson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=83911</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=83911"/>
				<updated>2010-05-25T16:39:37Z</updated>
		
		<summary type="html">&lt;p&gt;Andrew Wilson: /* JUNE MEETING INFO - TUES June 1st 2010 6:30 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:peteroalofs@gmail.com Pete Roalofs] and [mailto:a.wilson82@gmail.com Andrew Wilson]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
2010 Meetings&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix is running our 2010 meetings at the following time and location.&lt;br /&gt;
&lt;br /&gt;
Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour. &lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun. &lt;br /&gt;
&lt;br /&gt;
The meetings are now being hosted at University of Advanced Technology&lt;br /&gt;
&lt;br /&gt;
The location is:&lt;br /&gt;
&lt;br /&gt;
University of Advancing Technology&lt;br /&gt;
2625 W. BASELINE RD.&lt;br /&gt;
TEMPE, AZ 85283-1056&lt;br /&gt;
&lt;br /&gt;
== JUNE MEETING INFO - TUES June 1st 2010 6:30 PM  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix invites you to it's June meeting!&lt;br /&gt;
&lt;br /&gt;
Tuesday June 1st 2010 6:30 - 7:30 PM at University of Advancing Technology &lt;br /&gt;
The meetings are always free, unfortunately the drinks aren't.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;This month's meeting:&amp;lt;/b&amp;gt;&lt;br /&gt;
* Updates and Discussion&lt;br /&gt;
* &amp;lt;i&amp;gt;Involuntary Case Studies in Data Breaches&amp;lt;/i&amp;gt;, Rich Mogull, Securosis, [http://securosis.com/]&amp;lt;br /&amp;gt;&lt;br /&gt;
**It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
Drinks will be found afterword at Doc &amp;amp; Eddies.&lt;br /&gt;
&lt;br /&gt;
Doc &amp;amp; Eddy's, 909 East Minton Drive, Tempe, AZ 85282-7021&lt;br /&gt;
&lt;br /&gt;
== 2010 Meetings Calendar ==&lt;br /&gt;
This calendar will likely be updated on month to month basis. In absence of a speaker for a monthly meeting we will opt for a short discussion.&lt;br /&gt;
&lt;br /&gt;
* July - Michael Brooks (tentative)&lt;br /&gt;
* August - TBD&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]'''&lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.  We currently hold meetings every month, typically with one or two speakers at each meeting.  &lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see? ==&lt;br /&gt;
&amp;lt;b&amp;gt;Please Update&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Certificates&amp;lt;br/&amp;gt;&lt;br /&gt;
* Application Firewalls&amp;lt;br/&amp;gt;&lt;br /&gt;
* PHP&amp;lt;br/&amp;gt;&lt;br /&gt;
* Security ROI&amp;lt;br/&amp;gt;&lt;br /&gt;
* Penetration Testing Methods&amp;lt;br/&amp;gt;&lt;br /&gt;
* AJAX&amp;lt;br/&amp;gt;&lt;br /&gt;
* Cryptography in Web Applications&amp;lt;br/&amp;gt;&lt;br /&gt;
* Reversing ActiveX controls&amp;lt;br/&amp;gt;&lt;br /&gt;
* Using Local Proxies&amp;lt;br/&amp;gt;&lt;br /&gt;
* Browser Safety / Security&amp;lt;br/&amp;gt;&lt;br /&gt;
* Web services security: XML/SOAP/WSDL&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br/ &amp;gt;&lt;br /&gt;
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript).  It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;.  It was designed to protect browsers from executing code from external websites, which could be malicious.&lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy.  DNS Pinning didn't pan out exactly right, either.  Can client-side scripting allow malicious code to get into your browser history and cache?  Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer?  Can it access and modify files on your local hard drive or other connected filesystems?  Can client-side scripts be used to access and control everything you access online?  Can it be used to scan and attack your Intranet / local network?  Does an attacker have to target you in order to pull off one of these attacks successfully?  If I turn off Javascript or use NoScript, am I safe?  What other trust relationships does the web application n-Tier model break?&lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications.  Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch]&lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Andrew Wilson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=83910</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=83910"/>
				<updated>2010-05-25T16:39:09Z</updated>
		
		<summary type="html">&lt;p&gt;Andrew Wilson: /* 2010 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:peteroalofs@gmail.com Pete Roalofs] and [mailto:a.wilson82@gmail.com Andrew Wilson]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
2010 Meetings&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix is running our 2010 meetings at the following time and location.&lt;br /&gt;
&lt;br /&gt;
Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour. &lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun. &lt;br /&gt;
&lt;br /&gt;
The meetings are now being hosted at University of Advanced Technology&lt;br /&gt;
&lt;br /&gt;
The location is:&lt;br /&gt;
&lt;br /&gt;
University of Advancing Technology&lt;br /&gt;
2625 W. BASELINE RD.&lt;br /&gt;
TEMPE, AZ 85283-1056&lt;br /&gt;
&lt;br /&gt;
== JUNE MEETING INFO - TUES June 1st 2010 6:30 PM  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix invites you to it's June meeting!&lt;br /&gt;
&lt;br /&gt;
Tuesday June 1st 2010 6:30 - 7:30 PM at University of Advancing Technology &lt;br /&gt;
The meetings are always free, unfortunately the drinks aren't.&lt;br /&gt;
&lt;br /&gt;
This month's meeting:&lt;br /&gt;
* Updates and Discussion&lt;br /&gt;
* &amp;lt;b&amp;gt;Involuntary Case Studies in Data Breaches&amp;lt;/b&amp;gt;, Rich Mogull, Securosis, [http://securosis.com/]&amp;lt;br /&amp;gt;&lt;br /&gt;
**It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time.&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Drinks will be found afterword at Doc &amp;amp; Eddies.&lt;br /&gt;
&lt;br /&gt;
Doc &amp;amp; Eddy's, 909 East Minton Drive, Tempe, AZ 85282-7021&lt;br /&gt;
&lt;br /&gt;
== 2010 Meetings Calendar ==&lt;br /&gt;
This calendar will likely be updated on month to month basis. In absence of a speaker for a monthly meeting we will opt for a short discussion.&lt;br /&gt;
&lt;br /&gt;
* July - Michael Brooks (tentative)&lt;br /&gt;
* August - TBD&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]'''&lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.  We currently hold meetings every month, typically with one or two speakers at each meeting.  &lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see? ==&lt;br /&gt;
&amp;lt;b&amp;gt;Please Update&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Certificates&amp;lt;br/&amp;gt;&lt;br /&gt;
* Application Firewalls&amp;lt;br/&amp;gt;&lt;br /&gt;
* PHP&amp;lt;br/&amp;gt;&lt;br /&gt;
* Security ROI&amp;lt;br/&amp;gt;&lt;br /&gt;
* Penetration Testing Methods&amp;lt;br/&amp;gt;&lt;br /&gt;
* AJAX&amp;lt;br/&amp;gt;&lt;br /&gt;
* Cryptography in Web Applications&amp;lt;br/&amp;gt;&lt;br /&gt;
* Reversing ActiveX controls&amp;lt;br/&amp;gt;&lt;br /&gt;
* Using Local Proxies&amp;lt;br/&amp;gt;&lt;br /&gt;
* Browser Safety / Security&amp;lt;br/&amp;gt;&lt;br /&gt;
* Web services security: XML/SOAP/WSDL&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br/ &amp;gt;&lt;br /&gt;
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript).  It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;.  It was designed to protect browsers from executing code from external websites, which could be malicious.&lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy.  DNS Pinning didn't pan out exactly right, either.  Can client-side scripting allow malicious code to get into your browser history and cache?  Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer?  Can it access and modify files on your local hard drive or other connected filesystems?  Can client-side scripts be used to access and control everything you access online?  Can it be used to scan and attack your Intranet / local network?  Does an attacker have to target you in order to pull off one of these attacks successfully?  If I turn off Javascript or use NoScript, am I safe?  What other trust relationships does the web application n-Tier model break?&lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications.  Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch]&lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Andrew Wilson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=83909</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=83909"/>
				<updated>2010-05-25T16:31:03Z</updated>
		
		<summary type="html">&lt;p&gt;Andrew Wilson: /*JUNE MEETING INFO - TUES JUNE 1ST 2010 6:30 PM */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:peteroalofs@gmail.com Pete Roalofs] and [mailto:a.wilson82@gmail.com Andrew Wilson]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
2010 Meetings&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix is running our 2010 meetings at the following time and location.&lt;br /&gt;
&lt;br /&gt;
Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour. &lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun. &lt;br /&gt;
&lt;br /&gt;
The meetings are now being hosted at University of Advanced Technology&lt;br /&gt;
&lt;br /&gt;
The location is:&lt;br /&gt;
&lt;br /&gt;
University of Advancing Technology&lt;br /&gt;
2625 W. BASELINE RD.&lt;br /&gt;
TEMPE, AZ 85283-1056&lt;br /&gt;
&lt;br /&gt;
== JUNE MEETING INFO - TUES June 1st 2010 6:30 PM  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix invites you to it's June meeting!&lt;br /&gt;
&lt;br /&gt;
Tuesday June 1st 2010 6:30 - 7:30 PM at University of Advancing Technology &lt;br /&gt;
The meetings are always free, unfortunately the drinks aren't.&lt;br /&gt;
&lt;br /&gt;
This month's meeting:&lt;br /&gt;
* Updates and Discussion&lt;br /&gt;
* &amp;lt;b&amp;gt;Involuntary Case Studies in Data Breaches&amp;lt;/b&amp;gt;, Rich Mogull, Securosis, [http://securosis.com/]&amp;lt;br /&amp;gt;&lt;br /&gt;
**It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time.&lt;br /&gt;
&amp;lt;br/&amp;gt;&amp;lt;br/&amp;gt;&lt;br /&gt;
Drinks will be found afterword at Doc &amp;amp; Eddies.&lt;br /&gt;
&lt;br /&gt;
Doc &amp;amp; Eddy's, 909 East Minton Drive, Tempe, AZ 85282-7021&lt;br /&gt;
&lt;br /&gt;
== 2010 Meetings Calendar ==&lt;br /&gt;
This calendar will likely be updated on month to month basis. In absence of a speaker for a monthly meeting we will opt for a short discussion.&lt;br /&gt;
&lt;br /&gt;
* June - TBD&lt;br /&gt;
* July - TBD&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]'''&lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.  We currently hold meetings every month, typically with one or two speakers at each meeting.  &lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see? ==&lt;br /&gt;
&amp;lt;b&amp;gt;Please Update&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Certificates&amp;lt;br/&amp;gt;&lt;br /&gt;
* Application Firewalls&amp;lt;br/&amp;gt;&lt;br /&gt;
* PHP&amp;lt;br/&amp;gt;&lt;br /&gt;
* Security ROI&amp;lt;br/&amp;gt;&lt;br /&gt;
* Penetration Testing Methods&amp;lt;br/&amp;gt;&lt;br /&gt;
* AJAX&amp;lt;br/&amp;gt;&lt;br /&gt;
* Cryptography in Web Applications&amp;lt;br/&amp;gt;&lt;br /&gt;
* Reversing ActiveX controls&amp;lt;br/&amp;gt;&lt;br /&gt;
* Using Local Proxies&amp;lt;br/&amp;gt;&lt;br /&gt;
* Browser Safety / Security&amp;lt;br/&amp;gt;&lt;br /&gt;
* Web services security: XML/SOAP/WSDL&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br/ &amp;gt;&lt;br /&gt;
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript).  It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;.  It was designed to protect browsers from executing code from external websites, which could be malicious.&lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy.  DNS Pinning didn't pan out exactly right, either.  Can client-side scripting allow malicious code to get into your browser history and cache?  Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer?  Can it access and modify files on your local hard drive or other connected filesystems?  Can client-side scripts be used to access and control everything you access online?  Can it be used to scan and attack your Intranet / local network?  Does an attacker have to target you in order to pull off one of these attacks successfully?  If I turn off Javascript or use NoScript, am I safe?  What other trust relationships does the web application n-Tier model break?&lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications.  Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch]&lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Andrew Wilson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=81787</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=81787"/>
				<updated>2010-04-19T18:29:03Z</updated>
		
		<summary type="html">&lt;p&gt;Andrew Wilson: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:peteroalofs@gmail.com Pete Roalofs] and [mailto:a.wilson82@gmail.com Andrew Wilson]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
2010 Meetings&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix is running our 2010 meetings at the following time and location.&lt;br /&gt;
&lt;br /&gt;
Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour. &lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun. &lt;br /&gt;
&lt;br /&gt;
The meetings are now being hosted at University of Advanced Technology&lt;br /&gt;
&lt;br /&gt;
The location is:&lt;br /&gt;
&lt;br /&gt;
University of Advancing Technology&lt;br /&gt;
2625 W. BASELINE RD.&lt;br /&gt;
TEMPE, AZ 85283-1056&lt;br /&gt;
&lt;br /&gt;
== MAY MEETING INFO - TUES May 4TH 2010 6:30 PM  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix invites you to it's MAY meeting!&lt;br /&gt;
&lt;br /&gt;
Tues April 6th at 6:30 PM - 7:30 PM at University of Advancing Technology &lt;br /&gt;
The meetings are always free, unfortunately the drinks aren't.&lt;br /&gt;
&lt;br /&gt;
This month's meeting:&lt;br /&gt;
* Updates and Discussion: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
* &amp;lt;i&amp;gt;&amp;quot;Redefining &amp;amp; Understanding Security Posture&amp;quot;&amp;lt;/i&amp;gt; &amp;lt;b&amp;gt;Andrew Wilson&amp;lt;/b&amp;gt;, [http://www.doublethunk.org]&amp;lt;br /&amp;gt;&lt;br /&gt;
** One of the unfortunate realities of any industry is buzzword bingo.  We often take terms and throw them around because they sound cool, but generally without any actual or well understood meaning.  Security posture is one of those terms, that while rather popular, isn't really used in a well defined and functional fashion.  &lt;br /&gt;
** This presentation will help better outline: &lt;br /&gt;
*** What is posture &amp;amp; why is it important&lt;br /&gt;
*** How can be used to gain advantage, how can it be used against people&lt;br /&gt;
*** How does that have valuable meaning as it relates to the security industry.&lt;br /&gt;
&lt;br /&gt;
Drinks will be found afterword at Doc &amp;amp; Eddies.&lt;br /&gt;
&lt;br /&gt;
Doc &amp;amp; Eddy's, 909 East Minton Drive, Tempe, AZ 85282-7021&lt;br /&gt;
&lt;br /&gt;
== 2010 Meetings Calendar ==&lt;br /&gt;
This calendar will likely be updated on month to month basis. In absence of a speaker for a monthly meeting we will opt for a short discussion.&lt;br /&gt;
&lt;br /&gt;
* June - TBD&lt;br /&gt;
* July - TBD&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]'''&lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.  We currently hold meetings every month, typically with one or two speakers at each meeting.  &lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see? ==&lt;br /&gt;
&amp;lt;b&amp;gt;Please Update&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Certificates&amp;lt;br/&amp;gt;&lt;br /&gt;
* Application Firewalls&amp;lt;br/&amp;gt;&lt;br /&gt;
* PHP&amp;lt;br/&amp;gt;&lt;br /&gt;
* Security ROI&amp;lt;br/&amp;gt;&lt;br /&gt;
* Penetration Testing Methods&amp;lt;br/&amp;gt;&lt;br /&gt;
* AJAX&amp;lt;br/&amp;gt;&lt;br /&gt;
* Cryptography in Web Applications&amp;lt;br/&amp;gt;&lt;br /&gt;
* Reversing ActiveX controls&amp;lt;br/&amp;gt;&lt;br /&gt;
* Using Local Proxies&amp;lt;br/&amp;gt;&lt;br /&gt;
* Browser Safety / Security&amp;lt;br/&amp;gt;&lt;br /&gt;
* Web services security: XML/SOAP/WSDL&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br/ &amp;gt;&lt;br /&gt;
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript).  It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;.  It was designed to protect browsers from executing code from external websites, which could be malicious.&lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy.  DNS Pinning didn't pan out exactly right, either.  Can client-side scripting allow malicious code to get into your browser history and cache?  Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer?  Can it access and modify files on your local hard drive or other connected filesystems?  Can client-side scripts be used to access and control everything you access online?  Can it be used to scan and attack your Intranet / local network?  Does an attacker have to target you in order to pull off one of these attacks successfully?  If I turn off Javascript or use NoScript, am I safe?  What other trust relationships does the web application n-Tier model break?&lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications.  Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch]&lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Andrew Wilson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=80966</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=80966"/>
				<updated>2010-04-05T20:52:22Z</updated>
		
		<summary type="html">&lt;p&gt;Andrew Wilson: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:peteroalofs@gmail.com Pete Roalofs] and [mailto:a.wilson82@gmail.com Andrew Wilson]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
2010 Meetings&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix is running our 2010 meetings at the following time and location.&lt;br /&gt;
&lt;br /&gt;
Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour. &lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun. &lt;br /&gt;
&lt;br /&gt;
The meetings are now being hosted at University of Advanced Technology&lt;br /&gt;
&lt;br /&gt;
The location is:&lt;br /&gt;
&lt;br /&gt;
University of Advanced Technology&lt;br /&gt;
2625 W. BASELINE RD.&lt;br /&gt;
TEMPE, AZ 85283-1056&lt;br /&gt;
&lt;br /&gt;
== APRIL MEETING INFO - TUES APRIL 6TH 2010 6:30 PM  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix invites you to it's APRIL meeting!&lt;br /&gt;
NOTE the LAST MINUTE Change of Venue!&lt;br /&gt;
&lt;br /&gt;
Tues April 6th at 6:30 PM - 7:30 PM at University of Advanced Technology (CHANGE OF VENUE: WE WILL NOT BE MEETING AT ExecuTrain). &lt;br /&gt;
The meetings are always free, unfortunately the drinks aren't.&lt;br /&gt;
&lt;br /&gt;
This month's meeting:&lt;br /&gt;
* Updates and Discussion: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
* &amp;lt;i&amp;gt;&amp;quot;Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data&amp;quot;&amp;lt;/i&amp;gt; &amp;lt;b&amp;gt;Mr. Jill Naymie&amp;lt;/b&amp;gt;, [http://www.veracode.com Veracode]&amp;lt;br /&amp;gt;&lt;br /&gt;
** With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
** Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
** In this session we will cover:&lt;br /&gt;
***    Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
***  Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
***  Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Drinks will be found afterword, location will be decided after the meeting.&lt;br /&gt;
&lt;br /&gt;
== 2010 Meetings Calendar ==&lt;br /&gt;
This calendar will likely be updated on month to month basis. In absence of a speaker for a monthly meeting we will opt for a short discussion.&lt;br /&gt;
&lt;br /&gt;
* May - TBD&lt;br /&gt;
* June - TBD&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]'''&lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.  We currently hold meetings every month, typically with one or two speakers at each meeting.  &lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see? ==&lt;br /&gt;
&amp;lt;b&amp;gt;Please Update&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Certificates&amp;lt;br/&amp;gt;&lt;br /&gt;
* Application Firewalls&amp;lt;br/&amp;gt;&lt;br /&gt;
* PHP&amp;lt;br/&amp;gt;&lt;br /&gt;
* Security ROI&amp;lt;br/&amp;gt;&lt;br /&gt;
* Penetration Testing Methods&amp;lt;br/&amp;gt;&lt;br /&gt;
* AJAX&amp;lt;br/&amp;gt;&lt;br /&gt;
* Cryptography in Web Applications&amp;lt;br/&amp;gt;&lt;br /&gt;
* Reversing ActiveX controls&amp;lt;br/&amp;gt;&lt;br /&gt;
* Using Local Proxies&amp;lt;br/&amp;gt;&lt;br /&gt;
* Browser Safety / Security&amp;lt;br/&amp;gt;&lt;br /&gt;
* Web services security: XML/SOAP/WSDL&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br/ &amp;gt;&lt;br /&gt;
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript).  It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;.  It was designed to protect browsers from executing code from external websites, which could be malicious.&lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy.  DNS Pinning didn't pan out exactly right, either.  Can client-side scripting allow malicious code to get into your browser history and cache?  Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer?  Can it access and modify files on your local hard drive or other connected filesystems?  Can client-side scripts be used to access and control everything you access online?  Can it be used to scan and attack your Intranet / local network?  Does an attacker have to target you in order to pull off one of these attacks successfully?  If I turn off Javascript or use NoScript, am I safe?  What other trust relationships does the web application n-Tier model break?&lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications.  Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch]&lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Andrew Wilson</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=80965</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=80965"/>
				<updated>2010-04-05T20:46:50Z</updated>
		
		<summary type="html">&lt;p&gt;Andrew Wilson: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leaders are [mailto:peteroalofs@gmail.com Pete Roalofs] and [mailto:a.wilson82@gmail.com Andrew Wilson]&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
2010 Meetings&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix is running our 2010 meetings at the following time and location.&lt;br /&gt;
&lt;br /&gt;
Meetings will now be the first Tuesday of the month, every month, 6:30 PM - 7:30 PM, for 1 hour. &lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun. &lt;br /&gt;
&lt;br /&gt;
The meetings are now being hosted at University of Advanced Technology&lt;br /&gt;
&lt;br /&gt;
The location is:&lt;br /&gt;
&lt;br /&gt;
University of Advanced Technology&lt;br /&gt;
2625 W. BASELINE RD.&lt;br /&gt;
TEMPE, AZ 85283-1056 &lt;br /&gt;
&lt;br /&gt;
The entrance is on the West side of the building. Look for the suite number on the door.&lt;br /&gt;
&lt;br /&gt;
== APRIL MEETING INFO - TUES APRIL 6TH 2010 6:30 PM  ==&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix invites you to it's APRIL meeting!&lt;br /&gt;
NOTE the LAST MINUTE Change of Venue!&lt;br /&gt;
&lt;br /&gt;
Tues April 6th at 6:30 PM - 7:30 PM at University of Advanced Technology (CHANGE OF VENUE: WE WILL NOT BE MEETING AT ExecuTrain). &lt;br /&gt;
The meetings are always free, unfortunately the drinks aren't.&lt;br /&gt;
&lt;br /&gt;
This month's meeting:&lt;br /&gt;
* Updates and Discussion: &amp;lt;b&amp;gt;TBD&amp;lt;/b&amp;gt;&lt;br /&gt;
* &amp;lt;i&amp;gt;&amp;quot;Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data&amp;quot;&amp;lt;/i&amp;gt; &amp;lt;b&amp;gt;Mr. Jill Naymie&amp;lt;/b&amp;gt;, [http://www.veracode.com Veracode]&amp;lt;br /&amp;gt;&lt;br /&gt;
** With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
** Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
** In this session we will cover:&lt;br /&gt;
***    Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
***  Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
***  Methods to identify, track and remediate these vulnerabilities &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Drinks will be found afterword, location will be decided after the meeting.&lt;br /&gt;
&lt;br /&gt;
== 2010 Meetings Calendar ==&lt;br /&gt;
This calendar will likely be updated on month to month basis. In absence of a speaker for a monthly meeting we will opt for a short discussion.&lt;br /&gt;
&lt;br /&gt;
* May - TBD&lt;br /&gt;
* June - TBD&lt;br /&gt;
&lt;br /&gt;
== .   ==&lt;br /&gt;
&lt;br /&gt;
== Resources ==&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]'''&lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security.  We currently hold meetings every month, typically with one or two speakers at each meeting.  &lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see? ==&lt;br /&gt;
&amp;lt;b&amp;gt;Please Update&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Certificates&amp;lt;br/&amp;gt;&lt;br /&gt;
* Application Firewalls&amp;lt;br/&amp;gt;&lt;br /&gt;
* PHP&amp;lt;br/&amp;gt;&lt;br /&gt;
* Security ROI&amp;lt;br/&amp;gt;&lt;br /&gt;
* Penetration Testing Methods&amp;lt;br/&amp;gt;&lt;br /&gt;
* AJAX&amp;lt;br/&amp;gt;&lt;br /&gt;
* Cryptography in Web Applications&amp;lt;br/&amp;gt;&lt;br /&gt;
* Reversing ActiveX controls&amp;lt;br/&amp;gt;&lt;br /&gt;
* Using Local Proxies&amp;lt;br/&amp;gt;&lt;br /&gt;
* Browser Safety / Security&amp;lt;br/&amp;gt;&lt;br /&gt;
* Web services security: XML/SOAP/WSDL&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== .   ==&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br/ &amp;gt;&lt;br /&gt;
[http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br/ &amp;gt;&lt;br /&gt;
Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell'''&lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br/ &amp;gt;&lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript).  It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;.  It was designed to protect browsers from executing code from external websites, which could be malicious.&lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy.  DNS Pinning didn't pan out exactly right, either.  Can client-side scripting allow malicious code to get into your browser history and cache?  Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer?  Can it access and modify files on your local hard drive or other connected filesystems?  Can client-side scripts be used to access and control everything you access online?  Can it be used to scan and attack your Intranet / local network?  Does an attacker have to target you in order to pull off one of these attacks successfully?  If I turn off Javascript or use NoScript, am I safe?  What other trust relationships does the web application n-Tier model break?&lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications.  Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch]&lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Andrew Wilson</name></author>	</entry>

	</feed>