<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=AnnGrove</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=AnnGrove"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/AnnGrove"/>
		<updated>2026-04-21T15:34:49Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Threat_Modeling_Cheat_Sheet&amp;diff=232487</id>
		<title>Threat Modeling Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Threat_Modeling_Cheat_Sheet&amp;diff=232487"/>
				<updated>2017-08-22T00:43:42Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Why do we need to perform threat modeling */ Minor grammar edits. Clarifications.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;padding: 0;margin:0;margin-top:10px;text-align:left;&amp;quot; |-&lt;br /&gt;
| valign=&amp;quot;top&amp;quot; style=&amp;quot;border-right: 1px dotted gray;padding-right:25px;&amp;quot; |&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
= DRAFT CHEAT SHEET - WORK IN PROGRESS =&lt;br /&gt;
= Introduction =&lt;br /&gt;
&lt;br /&gt;
The objective of this cheat sheet is to provide guidance to developers, reviewers, designers and architects on conducting successful threat modeling. The main goal of threat modeling is to understand the controls needed for a software system. This is a complex endeavor that will involve investigations into:&lt;br /&gt;
# The trust boundaries to and within the solution that we build&lt;br /&gt;
# The actors that interact within and outside of the trust boundaries&lt;br /&gt;
# Information flows within and to and from the trust boundaries&lt;br /&gt;
# Information persistence within and out of trust boundaries&lt;br /&gt;
# Vulnerabilities at trust boundaries&lt;br /&gt;
# Threat agents that can exploit the vulnerabilities&lt;br /&gt;
# Impact of exploitation of vulnerability by a threat agents&lt;br /&gt;
# Controls  and process needed to treat specific risks&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Why do we need to perform threat modeling=&lt;br /&gt;
&lt;br /&gt;
1.	Performing threat model at the architecture level, helps in:&lt;br /&gt;
        a.	confirming suitability of the identified security features to be implemented&lt;br /&gt;
        b.	identification of any gaps in the security features to be implemented&lt;br /&gt;
        c.	identification of any further security features&lt;br /&gt;
        d.	identification of policy and process requirements&lt;br /&gt;
        e.	identification of requirements to be fed into security operations&lt;br /&gt;
        f.	identification of logging and monitoring requirements&lt;br /&gt;
        g.	arriving at abuse cases when used in agile methodology&lt;br /&gt;
        h.	understanding business continuity requirements&lt;br /&gt;
        i.	understanding capacity and availability requirements&lt;br /&gt;
&lt;br /&gt;
2.	Performing threat model at the design level, helps in:&lt;br /&gt;
        a.	identification of vulnerabilities that need to be closed at the design level and input this into the build phase&lt;br /&gt;
        b.	identification of information assets that need security controls&lt;br /&gt;
        c.	mapping of identified security controls into technical / administrative / physical controls as the case may be (this activity can be done at the architecture level as well, but doing it at the design level helps in being granular)&lt;br /&gt;
        d.	identification of security test cases / security test scenarios to test the security requirements&lt;br /&gt;
&lt;br /&gt;
=Starting the threat modeling exercise=&lt;br /&gt;
It is important for an organization to have or create a risk assessment policy that gives practitioner guidance on when to do a threat model, provides management guidance on assigning owners to risks, etc. &lt;br /&gt;
&lt;br /&gt;
An organization should also complete the following before beginning the threat modeling exercise:&lt;br /&gt;
&lt;br /&gt;
1. Make a list of all the stakeholders who need to participate in threat modeling. For example, stakeholders may include application architects, infrastructure architects, solution architects, business owners, etc.&lt;br /&gt;
&lt;br /&gt;
2. Get management buy-in for the exercise to ensure that there is management support for involvement of all necessary stakeholders.&lt;br /&gt;
&lt;br /&gt;
3. Confirm that the threat modeling exercise is led by the security team of the organisation and the risk log is maintained by the security team.&lt;br /&gt;
&lt;br /&gt;
Capturing the following information is part of the exercise:&lt;br /&gt;
&lt;br /&gt;
1. The trust boundaries to and within the solution that we build&lt;br /&gt;
&lt;br /&gt;
2. The actors that interact within and outside of the trust boundaries&lt;br /&gt;
&lt;br /&gt;
3. Information flows within and to and from the trust boundaries&lt;br /&gt;
&lt;br /&gt;
4. Information persistence within and out of trust boundaries 	&lt;br /&gt;
&lt;br /&gt;
5. Threats to transgression of trust boundaries by actors and for information flow and persistence&lt;br /&gt;
&lt;br /&gt;
6. Vulnerabilities at trust boundaries as accessed by actors and for information flow and persistence&lt;br /&gt;
&lt;br /&gt;
7. Threat agents that can exploit the vulnerabilities&lt;br /&gt;
&lt;br /&gt;
8. Impact of exploitation of vulnerability by a threat agent&lt;br /&gt;
&lt;br /&gt;
9. Decision tree to treat the risk&lt;br /&gt;
&lt;br /&gt;
=Decompose and Model the system=&lt;br /&gt;
&lt;br /&gt;
To perform a threat model, it is important to understand how the system works and interacts with its ecosystem.&lt;br /&gt;
To start with, create a high level information flow diagram, something like this:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;&amp;lt;Picture to be embedded&amp;gt;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
1.	Identify the trusted boundaries of your system / application / module / ecosystem that you may want to start off with.&lt;br /&gt;
&lt;br /&gt;
2.	Add actors – internal and external&lt;br /&gt;
&lt;br /&gt;
3.	Define internal trusted boundaries. These can be the different security zones that have been designed&lt;br /&gt;
&lt;br /&gt;
4.	Relook at the actors you have identified in #2 for consistency&lt;br /&gt;
&lt;br /&gt;
5.	Add information flows &lt;br /&gt;
      a.	Information in transit&lt;br /&gt;
      b.	Information at rest&lt;br /&gt;
      c.	Information processing&lt;br /&gt;
      d.	In the above diagram, following are the information flows:&lt;br /&gt;
              i.	Login Information&lt;br /&gt;
             ii.	Transmit login information&lt;br /&gt;
            iii.	Data process&lt;br /&gt;
             iv.	Data store&lt;br /&gt;
&lt;br /&gt;
6.	Identify the information elements and their classification as per your information classification policy&lt;br /&gt;
&lt;br /&gt;
7.	Where possible add assets to the identified information  flows&lt;br /&gt;
&lt;br /&gt;
8.	Identify threat agents for each of the information flows&lt;br /&gt;
&lt;br /&gt;
9.	Draw attack vectors and attack trees in an iteratively to make sure that no major attack vector is missed.&lt;br /&gt;
&lt;br /&gt;
10.	For each of the information flows perform threat assessment using any of the methodologies that meets the organisation’s requirements:&lt;br /&gt;
&lt;br /&gt;
11.	Add a probability value to the materialisation of each threat&lt;br /&gt;
&lt;br /&gt;
12.	Add a value for the impact of each threat materialisation&lt;br /&gt;
&lt;br /&gt;
13.	Identify the acceptable level of risk for the organisation or the identified scope&lt;br /&gt;
&lt;br /&gt;
14.	Identify the risks for mitigation that are above the acceptable level of risk &lt;br /&gt;
&lt;br /&gt;
15.	Mitigate the risks by doing one or more of the following:&lt;br /&gt;
         a.	Accept&lt;br /&gt;
         b.	Transfer&lt;br /&gt;
         c.	Avoid&lt;br /&gt;
         d.	Reduce&lt;br /&gt;
&lt;br /&gt;
=How to work on getting the mitigations in place, track them to closure and keep monitoring risks=&lt;br /&gt;
1.	Upon completion of the initial threat modelling exercise, assign identified risks to the relevant business / risk owners of threats for example&lt;br /&gt;
        a.	If there is an identified risk with the way the database is implemented, assign the risk responsibility to the owner of the database team. &lt;br /&gt;
        b.	If there is an identified risk with the application design, assign the risk responsibility to the owner of the application team&lt;br /&gt;
        c.	Although the risks are assigned to the database and application teams, the accountability of ensuring the risks are addressed lies with the business owner for the business the application is being developed for. At the end of the day, the business owner needs to understand the risk appetite of his/her business unit and whether the risk is above or below the acceptable level.&lt;br /&gt;
&lt;br /&gt;
2.	Maintain a Threat Traceability Matrix which at the minimum lists the following:&lt;br /&gt;
        a.	Information flow (along with the list of assets)&lt;br /&gt;
        b.	Threats for the information flows&lt;br /&gt;
        c.	Probability of occurrence of the risk&lt;br /&gt;
        d.	Impact of materialisation of the risk &lt;br /&gt;
        e.	Risk owner – responsibility wise&lt;br /&gt;
        f.	Risk owner – accountability wise&lt;br /&gt;
        g.	Mitigation&lt;br /&gt;
        h.	Last review date&lt;br /&gt;
        i.	Next review date&lt;br /&gt;
        j.	Instances of materialisation of the risk&lt;br /&gt;
&lt;br /&gt;
3.	Test the risk as a part of security testing to ensure that the mitigation works as expected&lt;br /&gt;
&lt;br /&gt;
Periodically retest the risk in either a vulnerability scan or as part of penetration test or security test to ensure that the mitigation remains in place and works as expected.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Further Reading=&lt;br /&gt;
https://www.owasp.org/index.php/Application_Threat_Modeling&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Authors and Primary Editors  ==&lt;br /&gt;
&lt;br /&gt;
TODO&lt;br /&gt;
&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
[[Category:Cheatsheets]]&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SQL_Injection_Prevention_Cheat_Sheet&amp;diff=231767</id>
		<title>SQL Injection Prevention Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SQL_Injection_Prevention_Cheat_Sheet&amp;diff=231767"/>
				<updated>2017-07-19T16:16:07Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Defense Option 4: Escaping All User-Supplied Input */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing clear, simple, actionable guidance for preventing SQL Injection flaws in your applications. [[SQL Injection]] attacks are unfortunately very common, and this is due to two factors:&lt;br /&gt;
&lt;br /&gt;
# the significant prevalence of SQL Injection vulnerabilities, and &lt;br /&gt;
# the attractiveness of the target (i.e., the database typically contains all the interesting/critical data for your application).&lt;br /&gt;
&lt;br /&gt;
It’s somewhat shameful that there are so many successful SQL Injection attacks occurring, because it is EXTREMELY simple to avoid SQL Injection vulnerabilities in your code.&lt;br /&gt;
&lt;br /&gt;
SQL Injection flaws are introduced when software developers create dynamic database queries that include user supplied input. To avoid SQL injection flaws is simple. Developers need to either:&lt;br /&gt;
a) stop writing dynamic queries; and/or&lt;br /&gt;
b) prevent user supplied input which contains malicious SQL from affecting the logic of the executed query.&lt;br /&gt;
&lt;br /&gt;
This article provides a set of simple techniques for preventing SQL Injection vulnerabilities by avoiding these two problems. These techniques can be used with practically any kind of programming language with any type of database. There are other types of databases, like XML databases, which can have similar problems (e.g., XPath and XQuery injection) and these techniques can be used to protect them as well.&lt;br /&gt;
&lt;br /&gt;
Primary Defenses:&lt;br /&gt;
* '''Option 1: Use of Prepared Statements (with Parameterized Queries)'''&lt;br /&gt;
* '''Option 2: Use of Stored Procedures'''&lt;br /&gt;
* '''Option 3: White List Input Validation'''&lt;br /&gt;
* '''Option 4: Escaping All User Supplied Input'''&lt;br /&gt;
&lt;br /&gt;
Additional Defenses:&lt;br /&gt;
* '''Also: Enforcing Least Privilege'''&lt;br /&gt;
* '''Also: Performing White List Input Validation as a Secondary Defense'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
;Unsafe Example&lt;br /&gt;
&lt;br /&gt;
SQL injection flaws typically look like this:&lt;br /&gt;
&lt;br /&gt;
The following (Java) example is UNSAFE, and would allow an attacker to inject code into the query that would be executed by the database. The unvalidated “customerName” parameter that is simply appended to the query allows an attacker to inject any SQL code they want. Unfortunately, this method for accessing databases is all too common.&lt;br /&gt;
&lt;br /&gt;
  String query = &amp;quot;SELECT account_balance FROM user_data WHERE user_name = &amp;quot;&lt;br /&gt;
    + request.getParameter(&amp;quot;customerName&amp;quot;);&lt;br /&gt;
  &lt;br /&gt;
  try {&lt;br /&gt;
  	Statement statement = connection.createStatement( … );&lt;br /&gt;
  	ResultSet results = statement.executeQuery( query );&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
=Primary Defenses=&lt;br /&gt;
&lt;br /&gt;
==Defense Option 1: Prepared Statements (with Parameterized Queries)==&lt;br /&gt;
&lt;br /&gt;
The use of prepared statements with variable binding (aka parameterized queries) is how all developers should first be taught how to write database queries. They are simple to write, and easier to understand than dynamic queries. Parameterized queries force the developer to first define all the SQL code, and then pass in each parameter to the query later. This coding style allows the database to distinguish between code and data, regardless of what user input is supplied.&lt;br /&gt;
&lt;br /&gt;
Prepared statements ensure that an attacker is not able to change the intent of a query, even if SQL commands are inserted by an attacker. In the safe example below, if an attacker were to enter the userID of tom' or '1'='1, the parameterized query would not be vulnerable and would instead look for a username which literally matched the entire string tom' or '1'='1.&lt;br /&gt;
&lt;br /&gt;
Language specific recommendations:&lt;br /&gt;
* Java EE – use PreparedStatement() with bind variables&lt;br /&gt;
* .NET – use parameterized queries like SqlCommand() or OleDbCommand() with bind variables&lt;br /&gt;
* PHP – use PDO with strongly typed parameterized queries (using bindParam())&lt;br /&gt;
* Hibernate - use createQuery() with bind variables (called named parameters in Hibernate)&lt;br /&gt;
* SQLite - use sqlite3_prepare() to create a [http://www.sqlite.org/c3ref/stmt.html statement object]&lt;br /&gt;
&lt;br /&gt;
In rare circumstances, prepared statements can harm performance. When confronted with this situation, it is best to either a) strongly validate all data or b) escape all user supplied input using an escaping routine specific to your database vendor as described below, rather than using a prepared statement.&lt;br /&gt;
&lt;br /&gt;
;Safe Java Prepared Statement Example	&lt;br /&gt;
&lt;br /&gt;
The following code example uses a PreparedStatement, Java's implementation of a parameterized query, to execute the same database query.&lt;br /&gt;
&lt;br /&gt;
  String custname = request.getParameter(&amp;quot;customerName&amp;quot;); // This should REALLY be validated too&lt;br /&gt;
  // perform input validation to detect attacks&lt;br /&gt;
  String query = &amp;quot;SELECT account_balance FROM user_data WHERE user_name = ? &amp;quot;;&lt;br /&gt;
  &lt;br /&gt;
  '''PreparedStatement pstmt = connection.prepareStatement( query );'''&lt;br /&gt;
  '''pstmt.setString( 1, custname); '''&lt;br /&gt;
  ResultSet results = pstmt.executeQuery( );&lt;br /&gt;
&lt;br /&gt;
;Safe C# .NET Prepared Statement Example	&lt;br /&gt;
&lt;br /&gt;
With .NET, it's even more straightforward. The creation and execution of the query doesn't change. All you have to do is simply pass the parameters to the query using the Parameters.Add() call as shown here.&lt;br /&gt;
 &lt;br /&gt;
  String query = &lt;br /&gt;
  	 &amp;quot;SELECT account_balance FROM user_data WHERE user_name = ?&amp;quot;;&lt;br /&gt;
  try {&lt;br /&gt;
  	OleDbCommand command = new OleDbCommand(query, connection);&lt;br /&gt;
  	'''command.Parameters.Add(new OleDbParameter(&amp;quot;customerName&amp;quot;, CustomerName Name.Text));'''&lt;br /&gt;
  	OleDbDataReader reader = command.ExecuteReader();&lt;br /&gt;
  	// …&lt;br /&gt;
  } catch (OleDbException se) {&lt;br /&gt;
  	// error handling&lt;br /&gt;
  } &lt;br /&gt;
&lt;br /&gt;
We have shown examples in Java and .NET but practically all other languages, including Cold Fusion, and Classic ASP, support parameterized query interfaces. Even SQL abstraction layers, like the [http://www.hibernate.org/ Hibernate Query Language] (HQL) have the same type of injection problems (which we call [http://cwe.mitre.org/data/definitions/564.html HQL Injection]). HQL supports parameterized queries as well, so we can avoid this problem:&lt;br /&gt;
&lt;br /&gt;
;Hibernate Query Language (HQL) Prepared Statement (Named Parameters) Examples	&lt;br /&gt;
&lt;br /&gt;
  First is an unsafe HQL Statement&lt;br /&gt;
  &lt;br /&gt;
  Query unsafeHQLQuery = session.createQuery(&amp;quot;from Inventory where productID='&amp;quot;+userSuppliedParameter+&amp;quot;'&amp;quot;);&lt;br /&gt;
  &lt;br /&gt;
  Here is a safe version of the same query using named parameters&lt;br /&gt;
  &lt;br /&gt;
  Query safeHQLQuery = session.createQuery(&amp;quot;from Inventory where productID=:productid&amp;quot;);&lt;br /&gt;
  safeHQLQuery.setParameter(&amp;quot;productid&amp;quot;, userSuppliedParameter);&lt;br /&gt;
&lt;br /&gt;
For examples of parameterized queries in other languages, including Ruby, PHP, Cold Fusion, and Perl, see the [[Query Parameterization Cheat Sheet]] or http://bobby-tables.com/.&lt;br /&gt;
&lt;br /&gt;
Developers tend to like the Prepared Statement approach because all the SQL code stays within the application. This makes your application relatively database independent.&lt;br /&gt;
&lt;br /&gt;
== Defense Option 2: Stored Procedures ==&lt;br /&gt;
 &lt;br /&gt;
Stored procedures are not always safe from SQL injection. However, certain standard stored procedure programming constructs have the same effect as the use of parameterized queries when implemented safely* which is the norm for most stored procedure languages. They require the developer to just build SQL statements with parameters which are automatically parameterized unless the developer does something largely out of the norm. The difference between prepared statements and stored procedures is that the SQL code for a stored procedure is defined and stored in the database itself, and then called from the application. Both of these techniques have the same effectiveness in preventing SQL injection so your organization should choose which approach makes the most sense for you.&lt;br /&gt;
 	&lt;br /&gt;
&amp;amp;#42;Note: 'Implemented safely' means the stored procedure does not include any unsafe dynamic SQL generation. Developers do not usually generate dynamic SQL inside stored procedures. However, it can be done, but should be avoided. If it can't be avoided, the stored procedure must use input validation or proper escaping as described in this article to make sure that all user supplied input to the stored procedure can't be used to inject SQL code into the dynamically generated query. Auditors should always look for uses of sp_execute, execute or exec within SQL Server stored procedures. Similar audit guidelines are necessary for similar functions for other vendors.&lt;br /&gt;
 &lt;br /&gt;
There are also several cases where stored procedures can increase risk.  For example, on MS SQL server, you have 3 main default roles: db_datareader, db_datawriter and db_owner. Before stored procedures came into use, DBA's would give db_datareader or db_datawriter rights to the webservice's user, depending on the requirements. However, stored procedures require execute rights, a role that is not available by default. Some setups where the user management has been centralized, but is limited to those 3 roles, cause all web apps to run under db_owner rights so stored procedures can work. Naturally, that means that if a server is breached the attacker has full rights to the database, where previously they might only have had read-access. More on this topic here. http://www.sqldbatips.com/showarticle.asp?ID=8&lt;br /&gt;
&lt;br /&gt;
;Safe Java Stored Procedure Example&lt;br /&gt;
&lt;br /&gt;
The following code example uses a CallableStatement, Java's implementation of the stored procedure interface, to execute the same database query. The &amp;quot;sp_getAccountBalance&amp;quot; stored procedure would have to be predefined in the database and implement the same functionality as the query defined above.&lt;br /&gt;
 &lt;br /&gt;
  String custname = request.getParameter(&amp;quot;customerName&amp;quot;); // This should REALLY be validated&lt;br /&gt;
  try {&lt;br /&gt;
  	'''CallableStatement cs = connection.prepareCall(&amp;quot;{call sp_getAccountBalance(?)}&amp;quot;);'''&lt;br /&gt;
  	'''cs.setString(1, custname);'''&lt;br /&gt;
  	ResultSet results = cs.executeQuery();		&lt;br /&gt;
  	// … result set handling &lt;br /&gt;
  } catch (SQLException se) {			&lt;br /&gt;
  	// … logging and error handling&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
;Safe VB .NET Stored Procedure Example	&lt;br /&gt;
&lt;br /&gt;
The following code example uses a SqlCommand, .NET’s implementation of the stored procedure interface, to execute the same database query. The &amp;quot;sp_getAccountBalance&amp;quot; stored procedure would have to be predefined in the database and implement the same functionality as the query defined above.&lt;br /&gt;
 &lt;br /&gt;
  Try&lt;br /&gt;
  	Dim command As SqlCommand = new SqlCommand(&amp;quot;sp_getAccountBalance&amp;quot;, connection)&lt;br /&gt;
  	'''command.CommandType = CommandType.StoredProcedure'''&lt;br /&gt;
  	'''command.Parameters.Add(new SqlParameter(&amp;quot;@CustomerName&amp;quot;, CustomerName.Text))'''&lt;br /&gt;
  	Dim reader As SqlDataReader = command.ExecuteReader()&lt;br /&gt;
  	‘ …&lt;br /&gt;
  Catch se As SqlException &lt;br /&gt;
  	‘ error handling&lt;br /&gt;
  End Try&lt;br /&gt;
&lt;br /&gt;
== Defense Option 3: White List Input Validation ==&lt;br /&gt;
&lt;br /&gt;
Various parts of SQL queries aren't legal locations for the use of bind variables, such as the names of tables or columns, and the sort order indicator (ASC or DESC). In such situations, input validation or query redesign is the most appropriate defense. For the names of tables or columns, ideally those values come from the code, and not from user parameters. But if user parameter values are used to make different for table names and column names, then the parameter values should be mapped to the legal/expected table or column names to make sure unvalidated user input doesn't end up in the query. Please note, this is a symptom of poor design and a full re-write should be considered if time allows. Here is an example of table name validation.&lt;br /&gt;
&lt;br /&gt;
  String tableName;&lt;br /&gt;
  switch(PARAM):&lt;br /&gt;
    case &amp;quot;Value1&amp;quot;: tableName = &amp;quot;fooTable&amp;quot;;&lt;br /&gt;
                   break;&lt;br /&gt;
    case &amp;quot;Value2&amp;quot;: tableName = &amp;quot;barTable&amp;quot;;&lt;br /&gt;
                   break;&lt;br /&gt;
      ...&lt;br /&gt;
    default      : throw new InputValidationException(&amp;quot;unexpected value provided for table name&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
The tableName can then be directly appended to the SQL query since it is now known to be one of the legal and expected values for a table name in this query. Keep in mind that generic table validation functions can lead to data loss as table names are used in queries where they are not expected.&lt;br /&gt;
&lt;br /&gt;
For something simple like a sort order, it would be best if the user supplied input is converted to a boolean, and then that boolean is used to select the safe value to append to the query. This is a very standard need in dynamic query creation. For example:&lt;br /&gt;
&lt;br /&gt;
  public String someMethod(boolean sortOrder) {&lt;br /&gt;
  &lt;br /&gt;
  String SQLquery = &amp;quot;some SQL ... order by Salary &amp;quot; + (sortOrder ? &amp;quot;ASC&amp;quot; : &amp;quot;DESC&amp;quot;);&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Any time user input can be converted to a non-String, like a date, numeric, boolean, enumerated type, etc. before it is appended to a query, or used to select a value to append to the query, this ensures it is safe to do so.&lt;br /&gt;
&lt;br /&gt;
Input validation is also recommended as a secondary defense in ALL cases, even when using bind variables as is discussed later in this article. More techniques on how to implement strong white list input validation is described in the [[Input Validation Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
==Defense Option 4: Escaping All User-Supplied Input==&lt;br /&gt;
&lt;br /&gt;
This technique should only be used as a last resort, when none of the above are feasible. Input validation is probably a better choice as this methodology is frail compared to other defenses and we cannot guarantee it will prevent all SQL Injection in all situations. &lt;br /&gt;
&lt;br /&gt;
This technique is to escape user input before putting it in a query. It is very database specific in its implementation. It's usually only recommended to retrofit legacy code when implementing input validation isn't cost effective. Applications built from scratch, or applications requiring low risk tolerance should be built or re-written using parameterized queries, stored procedures, or some kind of Object Relational Mapper (ORM) that builds your queries for you.&lt;br /&gt;
&lt;br /&gt;
This technique works like this. Each DBMS supports one or more character escaping schemes specific to certain kinds of queries. If you then escape all user supplied input using the proper escaping scheme for the database you are using, the DBMS will not confuse that input with SQL code written by the developer, thus avoiding any possible SQL injection vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The OWASP Enterprise Security API (ESAPI) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development.&lt;br /&gt;
&lt;br /&gt;
* Full details on [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API ESAPI are available here on OWASP].&lt;br /&gt;
* The javadoc for [http://www.javadoc.io/doc/org.owasp.esapi/esapi/2.1.0 ESAPI 2.x (Legacy) is available]. This code was migrated to GitHub in November 2014.&lt;br /&gt;
* Directly [http://code.google.com/p/owasp-esapi-java/source/browse/#svn/trunk/src/main/java/org/owasp/esapi browse the source for ESAPI for Java 2.x (Legacy) at GitHub], which is frequently helpful if the javadoc isn't perfectly clear.&lt;br /&gt;
* Directly [[Https://github.com/ESAPI/esapi-java|browse browse the source for ESAPI for Java 3.x (Active) at GitHub]].&lt;br /&gt;
&lt;br /&gt;
To find the javadoc specifically for the database encoders, click on the ‘Codec’ class on the left hand side. There are lots of Codecs implemented. The two Database specific codecs are OracleCodec, and MySQLCodec.&lt;br /&gt;
&lt;br /&gt;
Just click on their names in the ‘All Known Implementing Classes:’ at the top of the Interface Codec page.&lt;br /&gt;
&lt;br /&gt;
At this time, ESAPI currently has database encoders for:&lt;br /&gt;
* Oracle&lt;br /&gt;
* MySQL (Both ANSI and native modes are supported)&lt;br /&gt;
&lt;br /&gt;
Database encoders are forthcoming for:&lt;br /&gt;
* SQL Server&lt;br /&gt;
* PostgreSQL&lt;br /&gt;
&lt;br /&gt;
If your database encoder is missing, please let us know.&lt;br /&gt;
&lt;br /&gt;
===Database Specific Escaping Details===&lt;br /&gt;
&lt;br /&gt;
If you want to build your own escaping routines, here are the escaping details for each of the databases that we have developed ESAPI Encoders for:&lt;br /&gt;
* Oracle&lt;br /&gt;
* SQL Server&lt;br /&gt;
* DB2&lt;br /&gt;
&lt;br /&gt;
====Oracle Escaping====&lt;br /&gt;
&lt;br /&gt;
This information is based on the Oracle Escape character information found here: http://www.orafaq.com/wiki/SQL_FAQ#How_does_one_escape_special_characters_when_writing_SQL_queries.3F&lt;br /&gt;
&lt;br /&gt;
=====Escaping Dynamic Queries=====&lt;br /&gt;
&lt;br /&gt;
To use an ESAPI database codec is pretty simple. An Oracle example looks something like:&lt;br /&gt;
  ESAPI.encoder().encodeForSQL( new OracleCodec(), queryparam );&lt;br /&gt;
&lt;br /&gt;
So, if you had an existing Dynamic query being generated in your code that was going to Oracle that looked like this:&lt;br /&gt;
&lt;br /&gt;
  String query = &amp;quot;SELECT user_id FROM user_data WHERE user_name = '&amp;quot; + req.getParameter(&amp;quot;userID&amp;quot;) &lt;br /&gt;
  + &amp;quot;' and user_password = '&amp;quot; + req.getParameter(&amp;quot;pwd&amp;quot;) +&amp;quot;'&amp;quot;;&lt;br /&gt;
  try {&lt;br /&gt;
      Statement statement = connection.createStatement( … );&lt;br /&gt;
      ResultSet results = statement.executeQuery( query );&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
You would rewrite the first line to look like this:&lt;br /&gt;
&lt;br /&gt;
 '''Codec ORACLE_CODEC = new OracleCodec();'''&lt;br /&gt;
  String query = &amp;quot;SELECT user_id FROM user_data WHERE user_name = '&amp;quot; + &lt;br /&gt;
    '''ESAPI.encoder().encodeForSQL( ORACLE_CODEC, req.getParameter(&amp;quot;userID&amp;quot;))''' + &amp;quot;' and user_password = '&amp;quot;&lt;br /&gt;
    + '''ESAPI.encoder().encodeForSQL( ORACLE_CODEC, req.getParameter(&amp;quot;pwd&amp;quot;))''' +&amp;quot;'&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
And it would now be safe from SQL injection, regardless of the input supplied.&lt;br /&gt;
&lt;br /&gt;
For maximum code readability, you could also construct your own OracleEncoder.&lt;br /&gt;
&lt;br /&gt;
  Encoder oe = new OracleEncoder();&lt;br /&gt;
  String query = &amp;quot;SELECT user_id FROM user_data WHERE user_name = '&amp;quot; &lt;br /&gt;
    + '''oe.encode( req.getParameter(&amp;quot;userID&amp;quot;))''' + &amp;quot;' and user_password = '&amp;quot; &lt;br /&gt;
    + '''oe.encode( req.getParameter(&amp;quot;pwd&amp;quot;))''' +&amp;quot;'&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
With this type of solution, you would need only to wrap each user-supplied parameter being passed into an '''ESAPI.encoder().encodeForOracle( )''' call or whatever you named the call and you would be done.&lt;br /&gt;
&lt;br /&gt;
=====Turn off character replacement=====&lt;br /&gt;
&lt;br /&gt;
Use SET DEFINE OFF or SET SCAN OFF to ensure that automatic character replacement is turned off. If this character replacement is turned on, the &amp;amp; character will be treated like a SQLPlus variable prefix that could allow an attacker to retrieve private data. &lt;br /&gt;
&lt;br /&gt;
See http://download.oracle.com/docs/cd/B19306_01/server.102/b14357/ch12040.htm#i2698854 and http://stackoverflow.com/questions/152837/how-to-insert-a-string-which-contains-an for more information&lt;br /&gt;
&lt;br /&gt;
=====Escaping Wildcard characters in Like Clauses=====&lt;br /&gt;
&lt;br /&gt;
The LIKE keyword allows for text scanning searches. In Oracle, the underscore '_' character matches only one character, while the ampersand '%' is used to match zero or more occurrences of any characters. These characters must be escaped in LIKE clause criteria. For example:&lt;br /&gt;
&lt;br /&gt;
 SELECT name FROM emp &lt;br /&gt;
 WHERE id LIKE '%/_%' ESCAPE '/';&lt;br /&gt;
&lt;br /&gt;
 SELECT name FROM emp &lt;br /&gt;
 WHERE id LIKE '%\%%' ESCAPE '\';&lt;br /&gt;
&lt;br /&gt;
=====Oracle 10g escaping=====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;An alternative for Oracle 10g and later is to place { and } around the string to escape the entire string. However, you have to be careful that there isn't a } character already in the string. You must search for these and if there is one, then you must replace it with }}. Otherwise that character will end the escaping early, and may introduce a vulnerability.&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====MySQL Escaping====&lt;br /&gt;
&lt;br /&gt;
MySQL supports two escaping modes:&lt;br /&gt;
&lt;br /&gt;
# ANSI_QUOTES SQL mode, and a mode with this off, which we call&lt;br /&gt;
# MySQL mode.&lt;br /&gt;
&lt;br /&gt;
ANSI SQL mode: Simply encode all ' (single tick) characters with '&amp;amp;#39; (two single ticks)&lt;br /&gt;
&lt;br /&gt;
MySQL mode, do the following:&lt;br /&gt;
&lt;br /&gt;
  NUL (0x00) --&amp;gt; \0  [This is a zero, not the letter O]&lt;br /&gt;
  BS  (0x08) --&amp;gt; \b&lt;br /&gt;
  TAB (0x09) --&amp;gt; \t&lt;br /&gt;
  LF  (0x0a) --&amp;gt; \n&lt;br /&gt;
  CR  (0x0d) --&amp;gt; \r&lt;br /&gt;
  SUB (0x1a) --&amp;gt; \Z&lt;br /&gt;
  &amp;quot;   (0x22) --&amp;gt; \&amp;quot;&lt;br /&gt;
  %   (0x25) --&amp;gt; \%&lt;br /&gt;
  '   (0x27) --&amp;gt; \'&lt;br /&gt;
  \   (0x5c) --&amp;gt; \\&lt;br /&gt;
  _   (0x5f) --&amp;gt; \_ &lt;br /&gt;
  all other non-alphanumeric characters with ASCII values less than 256  --&amp;gt; \c&lt;br /&gt;
  where 'c' is the original non-alphanumeric character.&lt;br /&gt;
&lt;br /&gt;
This information is based on the MySQL Escape character information found here: http://mirror.yandex.ru/mirrors/ftp.mysql.com/doc/refman/5.0/en/string-syntax.html&lt;br /&gt;
&lt;br /&gt;
====SQL Server Escaping====&lt;br /&gt;
&lt;br /&gt;
We have not implemented the SQL Server escaping routine yet, but the following has good pointers and links to articles describing how to prevent SQL injection attacks on SQL server&lt;br /&gt;
* http://blogs.msdn.com/raulga/archive/2007/01/04/dynamic-sql-sql-injection.aspx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====DB2 Escaping====&lt;br /&gt;
This information is based on DB2 WebQuery special characters found here:  https://www-304.ibm.com/support/docview.wss?uid=nas14488c61e3223e8a78625744f00782983&lt;br /&gt;
as well as some information from Oracle's JDBC DB2 driver found here:&lt;br /&gt;
http://docs.oracle.com/cd/E12840_01/wls/docs103/jdbc_drivers/sqlescape.html&lt;br /&gt;
&lt;br /&gt;
Information in regards to differences between several DB2 Universal drivers can be found here:  http://publib.boulder.ibm.com/infocenter/db2luw/v8/index.jsp?topic=/com.ibm.db2.udb.doc/ad/rjvjcsqc.htm&lt;br /&gt;
&lt;br /&gt;
===Hex-encoding all input===&lt;br /&gt;
&lt;br /&gt;
A somewhat special case of escaping is the process of hex-encode the entire string received from the user (this can be seen as escaping every character).  The web application should hex-encode the user input before including it in the SQL statement.  The SQL statement should take into account this fact, and accordingly compare the data. For example, if we have to look up a record matching a sessionID, and the user transmitted the string abc123 as the session ID, the select statement would be:&lt;br /&gt;
&lt;br /&gt;
    SELECT ... FROM session&lt;br /&gt;
    WHERE hex_encode (sessionID) = '616263313233'&lt;br /&gt;
&lt;br /&gt;
(hex_encode should be replaced by the particular facility for the database being used.)  The string 606162313233 is the hex encoded version of the string received from the user (it is the sequence of hex values of the ASCII/UTF-8 codes of the user data).&lt;br /&gt;
&lt;br /&gt;
If an attacker were to transmit a string containing a single-quote character followed by their attempt to inject SQL code, the constructed SQL statement will only look like:&lt;br /&gt;
&lt;br /&gt;
    WHERE hex_encode ( ... ) = '2720 ... '&lt;br /&gt;
&lt;br /&gt;
27 being the ASCII code (in hex) of the single-quote, which is simply hex-encoded like any other character in the string.  The resulting SQL can only contain numeric digits and letters a to f, and never any special character that could enable an SQL injection.&lt;br /&gt;
&lt;br /&gt;
===Escaping SQLi in PHP===&lt;br /&gt;
&lt;br /&gt;
Use prepared statements and parameterized queries. These are SQL statements that are sent to and parsed by the database server separately from any parameters. This way it is impossible for an attacker to inject malicious SQL.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;You basically have two options to achieve this:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1. Using [http://php.net/manual/en/book.pdo.php PDO] (for any supported database driver):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$stmt = $pdo-&amp;gt;prepare('SELECT * FROM employees WHERE name = :name');&lt;br /&gt;
&lt;br /&gt;
$stmt-&amp;gt;execute(array('name' =&amp;gt; $name));&lt;br /&gt;
&lt;br /&gt;
foreach ($stmt as $row) {&lt;br /&gt;
    // do something with $row&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
2. Using [http://php.net/manual/en/book.mysqli.php MySQLi] (for MySQL):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$stmt = $dbConnection-&amp;gt;prepare('SELECT * FROM employees WHERE name = ?');&lt;br /&gt;
$stmt-&amp;gt;bind_param('s', $name);&lt;br /&gt;
&lt;br /&gt;
$stmt-&amp;gt;execute();&lt;br /&gt;
&lt;br /&gt;
$result = $stmt-&amp;gt;get_result();&lt;br /&gt;
while ($row = $result-&amp;gt;fetch_assoc()) {&lt;br /&gt;
    // do something with $row&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
PDO is the universal option. If you're connecting to a database other than MySQL, you can refer to a driver-specific second option (e.g. pg_prepare() and pg_execute() for PostgreSQL). &lt;br /&gt;
&lt;br /&gt;
= Additional Defenses =&lt;br /&gt;
&lt;br /&gt;
Beyond adopting one of the four primary defenses, we also recommend adopting all of these additional defenses in order to provide defense in depth. These additional defenses are:&lt;br /&gt;
&lt;br /&gt;
* '''Least Privilege'''&lt;br /&gt;
* '''White List Input Validation'''&lt;br /&gt;
&lt;br /&gt;
== Least Privilege ==&lt;br /&gt;
&lt;br /&gt;
To minimize the potential damage of a successful SQL injection attack, you should minimize the privileges assigned to every database account in your environment. Do not assign DBA or admin type access rights to your application accounts. We understand that this is easy, and everything just ‘works’ when you do it this way, but it is very dangerous. Start from the ground up to determine what access rights your application accounts require, rather than trying to figure out what access rights you need to take away. Make sure that accounts that only need read access are only granted read access to the tables they need access to. If an account only needs access to portions of a table, consider creating a view that limits access to that portion of the data and assigning the account access to the view instead, rather than the underlying table. Rarely, if ever, grant create or delete access to database accounts.&lt;br /&gt;
&lt;br /&gt;
If you adopt a policy where you use stored procedures everywhere, and don’t allow application accounts to directly execute their own queries, then restrict those accounts to only be able to execute the stored procedures they need. Don’t grant them any rights directly to the tables in the database.&lt;br /&gt;
&lt;br /&gt;
SQL injection is not the only threat to your database data. Attackers can simply change the parameter values from one of the legal values they are presented with, to a value that is unauthorized for them, but the application itself might be authorized to access. As such, minimizing the privileges granted to your application will reduce the likelihood of such unauthorized access attempts, even when an attacker is not trying to use SQL injection as part of their exploit.&lt;br /&gt;
&lt;br /&gt;
While you are at it, you should minimize the privileges of the operating system account that the DBMS runs under. Don't run your DBMS as root or system! Most DBMSs run out of the box with a very powerful system account. For example, MySQL runs as system on Windows by default! Change the DBMS's OS account to something more appropriate, with restricted privileges.&lt;br /&gt;
&lt;br /&gt;
=== Multiple DB Users ===&lt;br /&gt;
&lt;br /&gt;
The designer of web applications should not only avoid using the same owner/admin account in the web applications to connect to the database. Different DB users could be used for different web applications. In general, each separate web application that requires access to the database could have a designated database user account that the web-app will use to connect to the DB. That way, the designer of the application can have good granularity in the access control, thus reducing the privileges as much as possible. Each DB user will then have select access to what it needs only, and write-access as needed.&lt;br /&gt;
&lt;br /&gt;
As an example, a login page requires read access to the username and password fields of a table, but no write access of any form (no insert, update, or delete). However, the sign-up page certainly requires insert privilege to that table; this restriction can only be enforced if these web apps use different DB users to connect to the database.&lt;br /&gt;
&lt;br /&gt;
=== Views ===&lt;br /&gt;
&lt;br /&gt;
You can use SQL views to further increase the granularity of access by limiting the read access to specific fields of a table or joins of tables. It could potentially have additional benefits: for example, suppose that the system is required (perhaps due to some specific legal requirements) to store the passwords of the users, instead of salted-hashed passwords.  The designer could use views to compensate for this limitation; revoke all access to the table (from all DB users except the owner/admin) and create a view that outputs the hash of the password field and not the field itself.  Any SQL injection attack that succeeds in stealing DB information will be restricted to stealing the hash of the passwords (could even be a keyed hash), since no DB user for any of the web applications has access to the table itself.&lt;br /&gt;
&lt;br /&gt;
== White List Input Validation ==&lt;br /&gt;
&lt;br /&gt;
In addition to being a primary defense when nothing else is possible (e.g., when a bind variable isn't legal), input validation can also be a secondary defense used to detect unauthorized input before it is passed to the SQL query. For more information please see the [[Input Validation Cheat Sheet]]. Proceed with caution here. Validated data is not necessarily safe to insert into SQL queries via string building.&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Related Articles=&lt;br /&gt;
&lt;br /&gt;
'''SQL Injection Attack Cheat Sheets'''&lt;br /&gt;
&lt;br /&gt;
The following articles describe how to exploit different kinds of SQL Injection Vulnerabilities on various platforms that this article was created to help you avoid:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;SQL Injection Cheat Sheet&amp;quot; - http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/&lt;br /&gt;
* &amp;quot;Bypassing WAF's with SQLi&amp;quot; - [[SQL Injection Bypassing WAF]]&lt;br /&gt;
&lt;br /&gt;
'''Description of SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* OWASP article on [[SQL Injection]] Vulnerabilities&lt;br /&gt;
* OWASP article on [[Blind_SQL_Injection]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''How to Avoid SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Guide Project|OWASP Developers Guide]] article on how to [[Guide to SQL Injection | Avoid SQL Injection]] Vulnerabilities&lt;br /&gt;
* OWASP Cheat Sheet that provides [[Query_Parameterization_Cheat_Sheet|numerous language specific examples of parameterized queries using both Prepared Statements and Stored Procedures]]&lt;br /&gt;
* [http://bobby-tables.com/ The Bobby Tables site (inspired by the XKCD webcomic) has numerous examples in different languages of parameterized Prepared Statements and Stored Procedures]&lt;br /&gt;
&lt;br /&gt;
'''How to Review Code for SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing Code for SQL Injection|Review Code for SQL Injection]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''How to Test for SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to [[Testing for SQL Injection (OWASP-DV-005)|Test for SQL Injection]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
[[User:wichers|Dave Wichers]] - dave.wichers[at]owasp.org&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:jmanico|Jim Manico]] - jim[at]owasp.org&amp;lt;br /&amp;gt;&lt;br /&gt;
Matt Seil - mseil[at]acm.org&amp;lt;br&amp;gt;&lt;br /&gt;
[https://owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra] - mishra.dhiraj[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;br /&gt;
[[Category:Popular]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SQL_Injection_Prevention_Cheat_Sheet&amp;diff=231766</id>
		<title>SQL Injection Prevention Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SQL_Injection_Prevention_Cheat_Sheet&amp;diff=231766"/>
				<updated>2017-07-19T15:40:22Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Database Specific Escaping Details */  i added one too many bullets, so ... removed a bullet&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing clear, simple, actionable guidance for preventing SQL Injection flaws in your applications. [[SQL Injection]] attacks are unfortunately very common, and this is due to two factors:&lt;br /&gt;
&lt;br /&gt;
# the significant prevalence of SQL Injection vulnerabilities, and &lt;br /&gt;
# the attractiveness of the target (i.e., the database typically contains all the interesting/critical data for your application).&lt;br /&gt;
&lt;br /&gt;
It’s somewhat shameful that there are so many successful SQL Injection attacks occurring, because it is EXTREMELY simple to avoid SQL Injection vulnerabilities in your code.&lt;br /&gt;
&lt;br /&gt;
SQL Injection flaws are introduced when software developers create dynamic database queries that include user supplied input. To avoid SQL injection flaws is simple. Developers need to either:&lt;br /&gt;
a) stop writing dynamic queries; and/or&lt;br /&gt;
b) prevent user supplied input which contains malicious SQL from affecting the logic of the executed query.&lt;br /&gt;
&lt;br /&gt;
This article provides a set of simple techniques for preventing SQL Injection vulnerabilities by avoiding these two problems. These techniques can be used with practically any kind of programming language with any type of database. There are other types of databases, like XML databases, which can have similar problems (e.g., XPath and XQuery injection) and these techniques can be used to protect them as well.&lt;br /&gt;
&lt;br /&gt;
Primary Defenses:&lt;br /&gt;
* '''Option 1: Use of Prepared Statements (with Parameterized Queries)'''&lt;br /&gt;
* '''Option 2: Use of Stored Procedures'''&lt;br /&gt;
* '''Option 3: White List Input Validation'''&lt;br /&gt;
* '''Option 4: Escaping All User Supplied Input'''&lt;br /&gt;
&lt;br /&gt;
Additional Defenses:&lt;br /&gt;
* '''Also: Enforcing Least Privilege'''&lt;br /&gt;
* '''Also: Performing White List Input Validation as a Secondary Defense'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
;Unsafe Example&lt;br /&gt;
&lt;br /&gt;
SQL injection flaws typically look like this:&lt;br /&gt;
&lt;br /&gt;
The following (Java) example is UNSAFE, and would allow an attacker to inject code into the query that would be executed by the database. The unvalidated “customerName” parameter that is simply appended to the query allows an attacker to inject any SQL code they want. Unfortunately, this method for accessing databases is all too common.&lt;br /&gt;
&lt;br /&gt;
  String query = &amp;quot;SELECT account_balance FROM user_data WHERE user_name = &amp;quot;&lt;br /&gt;
    + request.getParameter(&amp;quot;customerName&amp;quot;);&lt;br /&gt;
  &lt;br /&gt;
  try {&lt;br /&gt;
  	Statement statement = connection.createStatement( … );&lt;br /&gt;
  	ResultSet results = statement.executeQuery( query );&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
=Primary Defenses=&lt;br /&gt;
&lt;br /&gt;
==Defense Option 1: Prepared Statements (with Parameterized Queries)==&lt;br /&gt;
&lt;br /&gt;
The use of prepared statements with variable binding (aka parameterized queries) is how all developers should first be taught how to write database queries. They are simple to write, and easier to understand than dynamic queries. Parameterized queries force the developer to first define all the SQL code, and then pass in each parameter to the query later. This coding style allows the database to distinguish between code and data, regardless of what user input is supplied.&lt;br /&gt;
&lt;br /&gt;
Prepared statements ensure that an attacker is not able to change the intent of a query, even if SQL commands are inserted by an attacker. In the safe example below, if an attacker were to enter the userID of tom' or '1'='1, the parameterized query would not be vulnerable and would instead look for a username which literally matched the entire string tom' or '1'='1.&lt;br /&gt;
&lt;br /&gt;
Language specific recommendations:&lt;br /&gt;
* Java EE – use PreparedStatement() with bind variables&lt;br /&gt;
* .NET – use parameterized queries like SqlCommand() or OleDbCommand() with bind variables&lt;br /&gt;
* PHP – use PDO with strongly typed parameterized queries (using bindParam())&lt;br /&gt;
* Hibernate - use createQuery() with bind variables (called named parameters in Hibernate)&lt;br /&gt;
* SQLite - use sqlite3_prepare() to create a [http://www.sqlite.org/c3ref/stmt.html statement object]&lt;br /&gt;
&lt;br /&gt;
In rare circumstances, prepared statements can harm performance. When confronted with this situation, it is best to either a) strongly validate all data or b) escape all user supplied input using an escaping routine specific to your database vendor as described below, rather than using a prepared statement.&lt;br /&gt;
&lt;br /&gt;
;Safe Java Prepared Statement Example	&lt;br /&gt;
&lt;br /&gt;
The following code example uses a PreparedStatement, Java's implementation of a parameterized query, to execute the same database query.&lt;br /&gt;
&lt;br /&gt;
  String custname = request.getParameter(&amp;quot;customerName&amp;quot;); // This should REALLY be validated too&lt;br /&gt;
  // perform input validation to detect attacks&lt;br /&gt;
  String query = &amp;quot;SELECT account_balance FROM user_data WHERE user_name = ? &amp;quot;;&lt;br /&gt;
  &lt;br /&gt;
  '''PreparedStatement pstmt = connection.prepareStatement( query );'''&lt;br /&gt;
  '''pstmt.setString( 1, custname); '''&lt;br /&gt;
  ResultSet results = pstmt.executeQuery( );&lt;br /&gt;
&lt;br /&gt;
;Safe C# .NET Prepared Statement Example	&lt;br /&gt;
&lt;br /&gt;
With .NET, it's even more straightforward. The creation and execution of the query doesn't change. All you have to do is simply pass the parameters to the query using the Parameters.Add() call as shown here.&lt;br /&gt;
 &lt;br /&gt;
  String query = &lt;br /&gt;
  	 &amp;quot;SELECT account_balance FROM user_data WHERE user_name = ?&amp;quot;;&lt;br /&gt;
  try {&lt;br /&gt;
  	OleDbCommand command = new OleDbCommand(query, connection);&lt;br /&gt;
  	'''command.Parameters.Add(new OleDbParameter(&amp;quot;customerName&amp;quot;, CustomerName Name.Text));'''&lt;br /&gt;
  	OleDbDataReader reader = command.ExecuteReader();&lt;br /&gt;
  	// …&lt;br /&gt;
  } catch (OleDbException se) {&lt;br /&gt;
  	// error handling&lt;br /&gt;
  } &lt;br /&gt;
&lt;br /&gt;
We have shown examples in Java and .NET but practically all other languages, including Cold Fusion, and Classic ASP, support parameterized query interfaces. Even SQL abstraction layers, like the [http://www.hibernate.org/ Hibernate Query Language] (HQL) have the same type of injection problems (which we call [http://cwe.mitre.org/data/definitions/564.html HQL Injection]). HQL supports parameterized queries as well, so we can avoid this problem:&lt;br /&gt;
&lt;br /&gt;
;Hibernate Query Language (HQL) Prepared Statement (Named Parameters) Examples	&lt;br /&gt;
&lt;br /&gt;
  First is an unsafe HQL Statement&lt;br /&gt;
  &lt;br /&gt;
  Query unsafeHQLQuery = session.createQuery(&amp;quot;from Inventory where productID='&amp;quot;+userSuppliedParameter+&amp;quot;'&amp;quot;);&lt;br /&gt;
  &lt;br /&gt;
  Here is a safe version of the same query using named parameters&lt;br /&gt;
  &lt;br /&gt;
  Query safeHQLQuery = session.createQuery(&amp;quot;from Inventory where productID=:productid&amp;quot;);&lt;br /&gt;
  safeHQLQuery.setParameter(&amp;quot;productid&amp;quot;, userSuppliedParameter);&lt;br /&gt;
&lt;br /&gt;
For examples of parameterized queries in other languages, including Ruby, PHP, Cold Fusion, and Perl, see the [[Query Parameterization Cheat Sheet]] or http://bobby-tables.com/.&lt;br /&gt;
&lt;br /&gt;
Developers tend to like the Prepared Statement approach because all the SQL code stays within the application. This makes your application relatively database independent.&lt;br /&gt;
&lt;br /&gt;
== Defense Option 2: Stored Procedures ==&lt;br /&gt;
 &lt;br /&gt;
Stored procedures are not always safe from SQL injection. However, certain standard stored procedure programming constructs have the same effect as the use of parameterized queries when implemented safely* which is the norm for most stored procedure languages. They require the developer to just build SQL statements with parameters which are automatically parameterized unless the developer does something largely out of the norm. The difference between prepared statements and stored procedures is that the SQL code for a stored procedure is defined and stored in the database itself, and then called from the application. Both of these techniques have the same effectiveness in preventing SQL injection so your organization should choose which approach makes the most sense for you.&lt;br /&gt;
 	&lt;br /&gt;
&amp;amp;#42;Note: 'Implemented safely' means the stored procedure does not include any unsafe dynamic SQL generation. Developers do not usually generate dynamic SQL inside stored procedures. However, it can be done, but should be avoided. If it can't be avoided, the stored procedure must use input validation or proper escaping as described in this article to make sure that all user supplied input to the stored procedure can't be used to inject SQL code into the dynamically generated query. Auditors should always look for uses of sp_execute, execute or exec within SQL Server stored procedures. Similar audit guidelines are necessary for similar functions for other vendors.&lt;br /&gt;
 &lt;br /&gt;
There are also several cases where stored procedures can increase risk.  For example, on MS SQL server, you have 3 main default roles: db_datareader, db_datawriter and db_owner. Before stored procedures came into use, DBA's would give db_datareader or db_datawriter rights to the webservice's user, depending on the requirements. However, stored procedures require execute rights, a role that is not available by default. Some setups where the user management has been centralized, but is limited to those 3 roles, cause all web apps to run under db_owner rights so stored procedures can work. Naturally, that means that if a server is breached the attacker has full rights to the database, where previously they might only have had read-access. More on this topic here. http://www.sqldbatips.com/showarticle.asp?ID=8&lt;br /&gt;
&lt;br /&gt;
;Safe Java Stored Procedure Example&lt;br /&gt;
&lt;br /&gt;
The following code example uses a CallableStatement, Java's implementation of the stored procedure interface, to execute the same database query. The &amp;quot;sp_getAccountBalance&amp;quot; stored procedure would have to be predefined in the database and implement the same functionality as the query defined above.&lt;br /&gt;
 &lt;br /&gt;
  String custname = request.getParameter(&amp;quot;customerName&amp;quot;); // This should REALLY be validated&lt;br /&gt;
  try {&lt;br /&gt;
  	'''CallableStatement cs = connection.prepareCall(&amp;quot;{call sp_getAccountBalance(?)}&amp;quot;);'''&lt;br /&gt;
  	'''cs.setString(1, custname);'''&lt;br /&gt;
  	ResultSet results = cs.executeQuery();		&lt;br /&gt;
  	// … result set handling &lt;br /&gt;
  } catch (SQLException se) {			&lt;br /&gt;
  	// … logging and error handling&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
;Safe VB .NET Stored Procedure Example	&lt;br /&gt;
&lt;br /&gt;
The following code example uses a SqlCommand, .NET’s implementation of the stored procedure interface, to execute the same database query. The &amp;quot;sp_getAccountBalance&amp;quot; stored procedure would have to be predefined in the database and implement the same functionality as the query defined above.&lt;br /&gt;
 &lt;br /&gt;
  Try&lt;br /&gt;
  	Dim command As SqlCommand = new SqlCommand(&amp;quot;sp_getAccountBalance&amp;quot;, connection)&lt;br /&gt;
  	'''command.CommandType = CommandType.StoredProcedure'''&lt;br /&gt;
  	'''command.Parameters.Add(new SqlParameter(&amp;quot;@CustomerName&amp;quot;, CustomerName.Text))'''&lt;br /&gt;
  	Dim reader As SqlDataReader = command.ExecuteReader()&lt;br /&gt;
  	‘ …&lt;br /&gt;
  Catch se As SqlException &lt;br /&gt;
  	‘ error handling&lt;br /&gt;
  End Try&lt;br /&gt;
&lt;br /&gt;
== Defense Option 3: White List Input Validation ==&lt;br /&gt;
&lt;br /&gt;
Various parts of SQL queries aren't legal locations for the use of bind variables, such as the names of tables or columns, and the sort order indicator (ASC or DESC). In such situations, input validation or query redesign is the most appropriate defense. For the names of tables or columns, ideally those values come from the code, and not from user parameters. But if user parameter values are used to make different for table names and column names, then the parameter values should be mapped to the legal/expected table or column names to make sure unvalidated user input doesn't end up in the query. Please note, this is a symptom of poor design and a full re-write should be considered if time allows. Here is an example of table name validation.&lt;br /&gt;
&lt;br /&gt;
  String tableName;&lt;br /&gt;
  switch(PARAM):&lt;br /&gt;
    case &amp;quot;Value1&amp;quot;: tableName = &amp;quot;fooTable&amp;quot;;&lt;br /&gt;
                   break;&lt;br /&gt;
    case &amp;quot;Value2&amp;quot;: tableName = &amp;quot;barTable&amp;quot;;&lt;br /&gt;
                   break;&lt;br /&gt;
      ...&lt;br /&gt;
    default      : throw new InputValidationException(&amp;quot;unexpected value provided for table name&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
The tableName can then be directly appended to the SQL query since it is now known to be one of the legal and expected values for a table name in this query. Keep in mind that generic table validation functions can lead to data loss as table names are used in queries where they are not expected.&lt;br /&gt;
&lt;br /&gt;
For something simple like a sort order, it would be best if the user supplied input is converted to a boolean, and then that boolean is used to select the safe value to append to the query. This is a very standard need in dynamic query creation. For example:&lt;br /&gt;
&lt;br /&gt;
  public String someMethod(boolean sortOrder) {&lt;br /&gt;
  &lt;br /&gt;
  String SQLquery = &amp;quot;some SQL ... order by Salary &amp;quot; + (sortOrder ? &amp;quot;ASC&amp;quot; : &amp;quot;DESC&amp;quot;);&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Any time user input can be converted to a non-String, like a date, numeric, boolean, enumerated type, etc. before it is appended to a query, or used to select a value to append to the query, this ensures it is safe to do so.&lt;br /&gt;
&lt;br /&gt;
Input validation is also recommended as a secondary defense in ALL cases, even when using bind variables as is discussed later in this article. More techniques on how to implement strong white list input validation is described in the [[Input Validation Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
==Defense Option 4: Escaping All User-Supplied Input==&lt;br /&gt;
&lt;br /&gt;
This technique should only be used as a last resort, when none of the above are feasible. Input validation is probably a better choice as this methodology is frail compared to other defenses and we cannot guarantee it will prevent all SQL Injection in all situations. &lt;br /&gt;
&lt;br /&gt;
This technique is to escape user input before putting it in a query. It is very database specific in its implementation. It's usually only recommended to retrofit legacy code when implementing input validation isn't cost effective. Applications built from scratch, or applications requiring low risk tolerance should be built or re-written using parameterized queries, stored procedures, or some kind of Object Relational Mapper (ORM) that builds your queries for you.&lt;br /&gt;
&lt;br /&gt;
This technique works like this. Each DBMS supports one or more character escaping schemes specific to certain kinds of queries. If you then escape all user supplied input using the proper escaping scheme for the database you are using, the DBMS will not confuse that input with SQL code written by the developer, thus avoiding any possible SQL injection vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The OWASP Enterprise Security API (ESAPI) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development.&lt;br /&gt;
&lt;br /&gt;
* Full details on [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API ESAPI are available here on OWASP].&lt;br /&gt;
* The javadoc for [http://www.javadoc.io/doc/org.owasp.esapi/esapi/2.1.0 ESAPI 2.x (Legacy) is available]. This code was migrated to GitHub in November 2014.&lt;br /&gt;
* Directly [http://code.google.com/p/owasp-esapi-java/source/browse/#svn/trunk/src/main/java/org/owasp/esapi browse the source for ESAPI for Java 2.x (Legacy) at GitHub], which is frequently helpful if the javadoc isn't perfectly clear.&lt;br /&gt;
* Directly [[Https://github.com/ESAPI/esapi-java|browse the source for ESAPI for Java 3.x (Active) at GitHub]].&lt;br /&gt;
&lt;br /&gt;
To find the javadoc specifically for the database encoders, click on the ‘Codec’ class on the left hand side. There are lots of Codecs implemented. The two Database specific codecs are OracleCodec, and MySQLCodec.&lt;br /&gt;
&lt;br /&gt;
Just click on their names in the ‘All Known Implementing Classes:’ at the top of the Interface Codec page.&lt;br /&gt;
&lt;br /&gt;
At this time, ESAPI currently has database encoders for:&lt;br /&gt;
* Oracle&lt;br /&gt;
* MySQL (Both ANSI and native modes are supported)&lt;br /&gt;
&lt;br /&gt;
Database encoders are forthcoming for:&lt;br /&gt;
* SQL Server&lt;br /&gt;
* PostgreSQL&lt;br /&gt;
&lt;br /&gt;
If your database encoder is missing, please let us know.&lt;br /&gt;
&lt;br /&gt;
===Database Specific Escaping Details===&lt;br /&gt;
&lt;br /&gt;
If you want to build your own escaping routines, here are the escaping details for each of the databases that we have developed ESAPI Encoders for:&lt;br /&gt;
* Oracle&lt;br /&gt;
* SQL Server&lt;br /&gt;
* DB2&lt;br /&gt;
&lt;br /&gt;
====Oracle Escaping====&lt;br /&gt;
&lt;br /&gt;
This information is based on the Oracle Escape character information found here: http://www.orafaq.com/wiki/SQL_FAQ#How_does_one_escape_special_characters_when_writing_SQL_queries.3F&lt;br /&gt;
&lt;br /&gt;
=====Escaping Dynamic Queries=====&lt;br /&gt;
&lt;br /&gt;
To use an ESAPI database codec is pretty simple. An Oracle example looks something like:&lt;br /&gt;
  ESAPI.encoder().encodeForSQL( new OracleCodec(), queryparam );&lt;br /&gt;
&lt;br /&gt;
So, if you had an existing Dynamic query being generated in your code that was going to Oracle that looked like this:&lt;br /&gt;
&lt;br /&gt;
  String query = &amp;quot;SELECT user_id FROM user_data WHERE user_name = '&amp;quot; + req.getParameter(&amp;quot;userID&amp;quot;) &lt;br /&gt;
  + &amp;quot;' and user_password = '&amp;quot; + req.getParameter(&amp;quot;pwd&amp;quot;) +&amp;quot;'&amp;quot;;&lt;br /&gt;
  try {&lt;br /&gt;
      Statement statement = connection.createStatement( … );&lt;br /&gt;
      ResultSet results = statement.executeQuery( query );&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
You would rewrite the first line to look like this:&lt;br /&gt;
&lt;br /&gt;
 '''Codec ORACLE_CODEC = new OracleCodec();'''&lt;br /&gt;
  String query = &amp;quot;SELECT user_id FROM user_data WHERE user_name = '&amp;quot; + &lt;br /&gt;
    '''ESAPI.encoder().encodeForSQL( ORACLE_CODEC, req.getParameter(&amp;quot;userID&amp;quot;))''' + &amp;quot;' and user_password = '&amp;quot;&lt;br /&gt;
    + '''ESAPI.encoder().encodeForSQL( ORACLE_CODEC, req.getParameter(&amp;quot;pwd&amp;quot;))''' +&amp;quot;'&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
And it would now be safe from SQL injection, regardless of the input supplied.&lt;br /&gt;
&lt;br /&gt;
For maximum code readability, you could also construct your own OracleEncoder.&lt;br /&gt;
&lt;br /&gt;
  Encoder oe = new OracleEncoder();&lt;br /&gt;
  String query = &amp;quot;SELECT user_id FROM user_data WHERE user_name = '&amp;quot; &lt;br /&gt;
    + '''oe.encode( req.getParameter(&amp;quot;userID&amp;quot;))''' + &amp;quot;' and user_password = '&amp;quot; &lt;br /&gt;
    + '''oe.encode( req.getParameter(&amp;quot;pwd&amp;quot;))''' +&amp;quot;'&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
With this type of solution, you would need only to wrap each user-supplied parameter being passed into an '''ESAPI.encoder().encodeForOracle( )''' call or whatever you named the call and you would be done.&lt;br /&gt;
&lt;br /&gt;
=====Turn off character replacement=====&lt;br /&gt;
&lt;br /&gt;
Use SET DEFINE OFF or SET SCAN OFF to ensure that automatic character replacement is turned off. If this character replacement is turned on, the &amp;amp; character will be treated like a SQLPlus variable prefix that could allow an attacker to retrieve private data. &lt;br /&gt;
&lt;br /&gt;
See http://download.oracle.com/docs/cd/B19306_01/server.102/b14357/ch12040.htm#i2698854 and http://stackoverflow.com/questions/152837/how-to-insert-a-string-which-contains-an for more information&lt;br /&gt;
&lt;br /&gt;
=====Escaping Wildcard characters in Like Clauses=====&lt;br /&gt;
&lt;br /&gt;
The LIKE keyword allows for text scanning searches. In Oracle, the underscore '_' character matches only one character, while the ampersand '%' is used to match zero or more occurrences of any characters. These characters must be escaped in LIKE clause criteria. For example:&lt;br /&gt;
&lt;br /&gt;
 SELECT name FROM emp &lt;br /&gt;
 WHERE id LIKE '%/_%' ESCAPE '/';&lt;br /&gt;
&lt;br /&gt;
 SELECT name FROM emp &lt;br /&gt;
 WHERE id LIKE '%\%%' ESCAPE '\';&lt;br /&gt;
&lt;br /&gt;
=====Oracle 10g escaping=====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;An alternative for Oracle 10g and later is to place { and } around the string to escape the entire string. However, you have to be careful that there isn't a } character already in the string. You must search for these and if there is one, then you must replace it with }}. Otherwise that character will end the escaping early, and may introduce a vulnerability.&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====MySQL Escaping====&lt;br /&gt;
&lt;br /&gt;
MySQL supports two escaping modes:&lt;br /&gt;
&lt;br /&gt;
# ANSI_QUOTES SQL mode, and a mode with this off, which we call&lt;br /&gt;
# MySQL mode.&lt;br /&gt;
&lt;br /&gt;
ANSI SQL mode: Simply encode all ' (single tick) characters with '&amp;amp;#39; (two single ticks)&lt;br /&gt;
&lt;br /&gt;
MySQL mode, do the following:&lt;br /&gt;
&lt;br /&gt;
  NUL (0x00) --&amp;gt; \0  [This is a zero, not the letter O]&lt;br /&gt;
  BS  (0x08) --&amp;gt; \b&lt;br /&gt;
  TAB (0x09) --&amp;gt; \t&lt;br /&gt;
  LF  (0x0a) --&amp;gt; \n&lt;br /&gt;
  CR  (0x0d) --&amp;gt; \r&lt;br /&gt;
  SUB (0x1a) --&amp;gt; \Z&lt;br /&gt;
  &amp;quot;   (0x22) --&amp;gt; \&amp;quot;&lt;br /&gt;
  %   (0x25) --&amp;gt; \%&lt;br /&gt;
  '   (0x27) --&amp;gt; \'&lt;br /&gt;
  \   (0x5c) --&amp;gt; \\&lt;br /&gt;
  _   (0x5f) --&amp;gt; \_ &lt;br /&gt;
  all other non-alphanumeric characters with ASCII values less than 256  --&amp;gt; \c&lt;br /&gt;
  where 'c' is the original non-alphanumeric character.&lt;br /&gt;
&lt;br /&gt;
This information is based on the MySQL Escape character information found here: http://mirror.yandex.ru/mirrors/ftp.mysql.com/doc/refman/5.0/en/string-syntax.html&lt;br /&gt;
&lt;br /&gt;
====SQL Server Escaping====&lt;br /&gt;
&lt;br /&gt;
We have not implemented the SQL Server escaping routine yet, but the following has good pointers and links to articles describing how to prevent SQL injection attacks on SQL server&lt;br /&gt;
* http://blogs.msdn.com/raulga/archive/2007/01/04/dynamic-sql-sql-injection.aspx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====DB2 Escaping====&lt;br /&gt;
This information is based on DB2 WebQuery special characters found here:  https://www-304.ibm.com/support/docview.wss?uid=nas14488c61e3223e8a78625744f00782983&lt;br /&gt;
as well as some information from Oracle's JDBC DB2 driver found here:&lt;br /&gt;
http://docs.oracle.com/cd/E12840_01/wls/docs103/jdbc_drivers/sqlescape.html&lt;br /&gt;
&lt;br /&gt;
Information in regards to differences between several DB2 Universal drivers can be found here:  http://publib.boulder.ibm.com/infocenter/db2luw/v8/index.jsp?topic=/com.ibm.db2.udb.doc/ad/rjvjcsqc.htm&lt;br /&gt;
&lt;br /&gt;
===Hex-encoding all input===&lt;br /&gt;
&lt;br /&gt;
A somewhat special case of escaping is the process of hex-encode the entire string received from the user (this can be seen as escaping every character).  The web application should hex-encode the user input before including it in the SQL statement.  The SQL statement should take into account this fact, and accordingly compare the data. For example, if we have to look up a record matching a sessionID, and the user transmitted the string abc123 as the session ID, the select statement would be:&lt;br /&gt;
&lt;br /&gt;
    SELECT ... FROM session&lt;br /&gt;
    WHERE hex_encode (sessionID) = '616263313233'&lt;br /&gt;
&lt;br /&gt;
(hex_encode should be replaced by the particular facility for the database being used.)  The string 606162313233 is the hex encoded version of the string received from the user (it is the sequence of hex values of the ASCII/UTF-8 codes of the user data).&lt;br /&gt;
&lt;br /&gt;
If an attacker were to transmit a string containing a single-quote character followed by their attempt to inject SQL code, the constructed SQL statement will only look like:&lt;br /&gt;
&lt;br /&gt;
    WHERE hex_encode ( ... ) = '2720 ... '&lt;br /&gt;
&lt;br /&gt;
27 being the ASCII code (in hex) of the single-quote, which is simply hex-encoded like any other character in the string.  The resulting SQL can only contain numeric digits and letters a to f, and never any special character that could enable an SQL injection.&lt;br /&gt;
&lt;br /&gt;
===Escaping SQLi in PHP===&lt;br /&gt;
&lt;br /&gt;
Use prepared statements and parameterized queries. These are SQL statements that are sent to and parsed by the database server separately from any parameters. This way it is impossible for an attacker to inject malicious SQL.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;You basically have two options to achieve this:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1. Using [http://php.net/manual/en/book.pdo.php PDO] (for any supported database driver):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$stmt = $pdo-&amp;gt;prepare('SELECT * FROM employees WHERE name = :name');&lt;br /&gt;
&lt;br /&gt;
$stmt-&amp;gt;execute(array('name' =&amp;gt; $name));&lt;br /&gt;
&lt;br /&gt;
foreach ($stmt as $row) {&lt;br /&gt;
    // do something with $row&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
2. Using [http://php.net/manual/en/book.mysqli.php MySQLi] (for MySQL):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$stmt = $dbConnection-&amp;gt;prepare('SELECT * FROM employees WHERE name = ?');&lt;br /&gt;
$stmt-&amp;gt;bind_param('s', $name);&lt;br /&gt;
&lt;br /&gt;
$stmt-&amp;gt;execute();&lt;br /&gt;
&lt;br /&gt;
$result = $stmt-&amp;gt;get_result();&lt;br /&gt;
while ($row = $result-&amp;gt;fetch_assoc()) {&lt;br /&gt;
    // do something with $row&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
PDO is the universal option. If you're connecting to a database other than MySQL, you can refer to a driver-specific second option (e.g. pg_prepare() and pg_execute() for PostgreSQL). &lt;br /&gt;
&lt;br /&gt;
= Additional Defenses =&lt;br /&gt;
&lt;br /&gt;
Beyond adopting one of the four primary defenses, we also recommend adopting all of these additional defenses in order to provide defense in depth. These additional defenses are:&lt;br /&gt;
&lt;br /&gt;
* '''Least Privilege'''&lt;br /&gt;
* '''White List Input Validation'''&lt;br /&gt;
&lt;br /&gt;
== Least Privilege ==&lt;br /&gt;
&lt;br /&gt;
To minimize the potential damage of a successful SQL injection attack, you should minimize the privileges assigned to every database account in your environment. Do not assign DBA or admin type access rights to your application accounts. We understand that this is easy, and everything just ‘works’ when you do it this way, but it is very dangerous. Start from the ground up to determine what access rights your application accounts require, rather than trying to figure out what access rights you need to take away. Make sure that accounts that only need read access are only granted read access to the tables they need access to. If an account only needs access to portions of a table, consider creating a view that limits access to that portion of the data and assigning the account access to the view instead, rather than the underlying table. Rarely, if ever, grant create or delete access to database accounts.&lt;br /&gt;
&lt;br /&gt;
If you adopt a policy where you use stored procedures everywhere, and don’t allow application accounts to directly execute their own queries, then restrict those accounts to only be able to execute the stored procedures they need. Don’t grant them any rights directly to the tables in the database.&lt;br /&gt;
&lt;br /&gt;
SQL injection is not the only threat to your database data. Attackers can simply change the parameter values from one of the legal values they are presented with, to a value that is unauthorized for them, but the application itself might be authorized to access. As such, minimizing the privileges granted to your application will reduce the likelihood of such unauthorized access attempts, even when an attacker is not trying to use SQL injection as part of their exploit.&lt;br /&gt;
&lt;br /&gt;
While you are at it, you should minimize the privileges of the operating system account that the DBMS runs under. Don't run your DBMS as root or system! Most DBMSs run out of the box with a very powerful system account. For example, MySQL runs as system on Windows by default! Change the DBMS's OS account to something more appropriate, with restricted privileges.&lt;br /&gt;
&lt;br /&gt;
=== Multiple DB Users ===&lt;br /&gt;
&lt;br /&gt;
The designer of web applications should not only avoid using the same owner/admin account in the web applications to connect to the database. Different DB users could be used for different web applications. In general, each separate web application that requires access to the database could have a designated database user account that the web-app will use to connect to the DB. That way, the designer of the application can have good granularity in the access control, thus reducing the privileges as much as possible. Each DB user will then have select access to what it needs only, and write-access as needed.&lt;br /&gt;
&lt;br /&gt;
As an example, a login page requires read access to the username and password fields of a table, but no write access of any form (no insert, update, or delete). However, the sign-up page certainly requires insert privilege to that table; this restriction can only be enforced if these web apps use different DB users to connect to the database.&lt;br /&gt;
&lt;br /&gt;
=== Views ===&lt;br /&gt;
&lt;br /&gt;
You can use SQL views to further increase the granularity of access by limiting the read access to specific fields of a table or joins of tables. It could potentially have additional benefits: for example, suppose that the system is required (perhaps due to some specific legal requirements) to store the passwords of the users, instead of salted-hashed passwords.  The designer could use views to compensate for this limitation; revoke all access to the table (from all DB users except the owner/admin) and create a view that outputs the hash of the password field and not the field itself.  Any SQL injection attack that succeeds in stealing DB information will be restricted to stealing the hash of the passwords (could even be a keyed hash), since no DB user for any of the web applications has access to the table itself.&lt;br /&gt;
&lt;br /&gt;
== White List Input Validation ==&lt;br /&gt;
&lt;br /&gt;
In addition to being a primary defense when nothing else is possible (e.g., when a bind variable isn't legal), input validation can also be a secondary defense used to detect unauthorized input before it is passed to the SQL query. For more information please see the [[Input Validation Cheat Sheet]]. Proceed with caution here. Validated data is not necessarily safe to insert into SQL queries via string building.&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Related Articles=&lt;br /&gt;
&lt;br /&gt;
'''SQL Injection Attack Cheat Sheets'''&lt;br /&gt;
&lt;br /&gt;
The following articles describe how to exploit different kinds of SQL Injection Vulnerabilities on various platforms that this article was created to help you avoid:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;SQL Injection Cheat Sheet&amp;quot; - http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/&lt;br /&gt;
* &amp;quot;Bypassing WAF's with SQLi&amp;quot; - [[SQL Injection Bypassing WAF]]&lt;br /&gt;
&lt;br /&gt;
'''Description of SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* OWASP article on [[SQL Injection]] Vulnerabilities&lt;br /&gt;
* OWASP article on [[Blind_SQL_Injection]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''How to Avoid SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Guide Project|OWASP Developers Guide]] article on how to [[Guide to SQL Injection | Avoid SQL Injection]] Vulnerabilities&lt;br /&gt;
* OWASP Cheat Sheet that provides [[Query_Parameterization_Cheat_Sheet|numerous language specific examples of parameterized queries using both Prepared Statements and Stored Procedures]]&lt;br /&gt;
* [http://bobby-tables.com/ The Bobby Tables site (inspired by the XKCD webcomic) has numerous examples in different languages of parameterized Prepared Statements and Stored Procedures]&lt;br /&gt;
&lt;br /&gt;
'''How to Review Code for SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing Code for SQL Injection|Review Code for SQL Injection]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''How to Test for SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to [[Testing for SQL Injection (OWASP-DV-005)|Test for SQL Injection]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
[[User:wichers|Dave Wichers]] - dave.wichers[at]owasp.org&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:jmanico|Jim Manico]] - jim[at]owasp.org&amp;lt;br /&amp;gt;&lt;br /&gt;
Matt Seil - mseil[at]acm.org&amp;lt;br&amp;gt;&lt;br /&gt;
[https://owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra] - mishra.dhiraj[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;br /&gt;
[[Category:Popular]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SQL_Injection_Prevention_Cheat_Sheet&amp;diff=231765</id>
		<title>SQL Injection Prevention Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SQL_Injection_Prevention_Cheat_Sheet&amp;diff=231765"/>
				<updated>2017-07-19T15:38:52Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Defense Option 4: Escaping All User Supplied Input */  This page had a couple of bad links and some erosion from edits over time, such as the list at the top not including defense option 4.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt; __NOTOC__&lt;br /&gt;
&amp;lt;div style=&amp;quot;width:100%;height:160px;border:0,margin:0;overflow: hidden;&amp;quot;&amp;gt;[[File:Cheatsheets-header.jpg|link=]]&amp;lt;/div&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Last revision (mm/dd/yy): '''{{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}''' &lt;br /&gt;
= Introduction  =&lt;br /&gt;
 __TOC__{{TOC hidden}}&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing clear, simple, actionable guidance for preventing SQL Injection flaws in your applications. [[SQL Injection]] attacks are unfortunately very common, and this is due to two factors:&lt;br /&gt;
&lt;br /&gt;
# the significant prevalence of SQL Injection vulnerabilities, and &lt;br /&gt;
# the attractiveness of the target (i.e., the database typically contains all the interesting/critical data for your application).&lt;br /&gt;
&lt;br /&gt;
It’s somewhat shameful that there are so many successful SQL Injection attacks occurring, because it is EXTREMELY simple to avoid SQL Injection vulnerabilities in your code.&lt;br /&gt;
&lt;br /&gt;
SQL Injection flaws are introduced when software developers create dynamic database queries that include user supplied input. To avoid SQL injection flaws is simple. Developers need to either:&lt;br /&gt;
a) stop writing dynamic queries; and/or&lt;br /&gt;
b) prevent user supplied input which contains malicious SQL from affecting the logic of the executed query.&lt;br /&gt;
&lt;br /&gt;
This article provides a set of simple techniques for preventing SQL Injection vulnerabilities by avoiding these two problems. These techniques can be used with practically any kind of programming language with any type of database. There are other types of databases, like XML databases, which can have similar problems (e.g., XPath and XQuery injection) and these techniques can be used to protect them as well.&lt;br /&gt;
&lt;br /&gt;
Primary Defenses:&lt;br /&gt;
* '''Option 1: Use of Prepared Statements (with Parameterized Queries)'''&lt;br /&gt;
* '''Option 2: Use of Stored Procedures'''&lt;br /&gt;
* '''Option 3: White List Input Validation'''&lt;br /&gt;
* '''Option 4: Escaping All User Supplied Input'''&lt;br /&gt;
&lt;br /&gt;
Additional Defenses:&lt;br /&gt;
* '''Also: Enforcing Least Privilege'''&lt;br /&gt;
* '''Also: Performing White List Input Validation as a Secondary Defense'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
;Unsafe Example&lt;br /&gt;
&lt;br /&gt;
SQL injection flaws typically look like this:&lt;br /&gt;
&lt;br /&gt;
The following (Java) example is UNSAFE, and would allow an attacker to inject code into the query that would be executed by the database. The unvalidated “customerName” parameter that is simply appended to the query allows an attacker to inject any SQL code they want. Unfortunately, this method for accessing databases is all too common.&lt;br /&gt;
&lt;br /&gt;
  String query = &amp;quot;SELECT account_balance FROM user_data WHERE user_name = &amp;quot;&lt;br /&gt;
    + request.getParameter(&amp;quot;customerName&amp;quot;);&lt;br /&gt;
  &lt;br /&gt;
  try {&lt;br /&gt;
  	Statement statement = connection.createStatement( … );&lt;br /&gt;
  	ResultSet results = statement.executeQuery( query );&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
=Primary Defenses=&lt;br /&gt;
&lt;br /&gt;
==Defense Option 1: Prepared Statements (with Parameterized Queries)==&lt;br /&gt;
&lt;br /&gt;
The use of prepared statements with variable binding (aka parameterized queries) is how all developers should first be taught how to write database queries. They are simple to write, and easier to understand than dynamic queries. Parameterized queries force the developer to first define all the SQL code, and then pass in each parameter to the query later. This coding style allows the database to distinguish between code and data, regardless of what user input is supplied.&lt;br /&gt;
&lt;br /&gt;
Prepared statements ensure that an attacker is not able to change the intent of a query, even if SQL commands are inserted by an attacker. In the safe example below, if an attacker were to enter the userID of tom' or '1'='1, the parameterized query would not be vulnerable and would instead look for a username which literally matched the entire string tom' or '1'='1.&lt;br /&gt;
&lt;br /&gt;
Language specific recommendations:&lt;br /&gt;
* Java EE – use PreparedStatement() with bind variables&lt;br /&gt;
* .NET – use parameterized queries like SqlCommand() or OleDbCommand() with bind variables&lt;br /&gt;
* PHP – use PDO with strongly typed parameterized queries (using bindParam())&lt;br /&gt;
* Hibernate - use createQuery() with bind variables (called named parameters in Hibernate)&lt;br /&gt;
* SQLite - use sqlite3_prepare() to create a [http://www.sqlite.org/c3ref/stmt.html statement object]&lt;br /&gt;
&lt;br /&gt;
In rare circumstances, prepared statements can harm performance. When confronted with this situation, it is best to either a) strongly validate all data or b) escape all user supplied input using an escaping routine specific to your database vendor as described below, rather than using a prepared statement.&lt;br /&gt;
&lt;br /&gt;
;Safe Java Prepared Statement Example	&lt;br /&gt;
&lt;br /&gt;
The following code example uses a PreparedStatement, Java's implementation of a parameterized query, to execute the same database query.&lt;br /&gt;
&lt;br /&gt;
  String custname = request.getParameter(&amp;quot;customerName&amp;quot;); // This should REALLY be validated too&lt;br /&gt;
  // perform input validation to detect attacks&lt;br /&gt;
  String query = &amp;quot;SELECT account_balance FROM user_data WHERE user_name = ? &amp;quot;;&lt;br /&gt;
  &lt;br /&gt;
  '''PreparedStatement pstmt = connection.prepareStatement( query );'''&lt;br /&gt;
  '''pstmt.setString( 1, custname); '''&lt;br /&gt;
  ResultSet results = pstmt.executeQuery( );&lt;br /&gt;
&lt;br /&gt;
;Safe C# .NET Prepared Statement Example	&lt;br /&gt;
&lt;br /&gt;
With .NET, it's even more straightforward. The creation and execution of the query doesn't change. All you have to do is simply pass the parameters to the query using the Parameters.Add() call as shown here.&lt;br /&gt;
 &lt;br /&gt;
  String query = &lt;br /&gt;
  	 &amp;quot;SELECT account_balance FROM user_data WHERE user_name = ?&amp;quot;;&lt;br /&gt;
  try {&lt;br /&gt;
  	OleDbCommand command = new OleDbCommand(query, connection);&lt;br /&gt;
  	'''command.Parameters.Add(new OleDbParameter(&amp;quot;customerName&amp;quot;, CustomerName Name.Text));'''&lt;br /&gt;
  	OleDbDataReader reader = command.ExecuteReader();&lt;br /&gt;
  	// …&lt;br /&gt;
  } catch (OleDbException se) {&lt;br /&gt;
  	// error handling&lt;br /&gt;
  } &lt;br /&gt;
&lt;br /&gt;
We have shown examples in Java and .NET but practically all other languages, including Cold Fusion, and Classic ASP, support parameterized query interfaces. Even SQL abstraction layers, like the [http://www.hibernate.org/ Hibernate Query Language] (HQL) have the same type of injection problems (which we call [http://cwe.mitre.org/data/definitions/564.html HQL Injection]). HQL supports parameterized queries as well, so we can avoid this problem:&lt;br /&gt;
&lt;br /&gt;
;Hibernate Query Language (HQL) Prepared Statement (Named Parameters) Examples	&lt;br /&gt;
&lt;br /&gt;
  First is an unsafe HQL Statement&lt;br /&gt;
  &lt;br /&gt;
  Query unsafeHQLQuery = session.createQuery(&amp;quot;from Inventory where productID='&amp;quot;+userSuppliedParameter+&amp;quot;'&amp;quot;);&lt;br /&gt;
  &lt;br /&gt;
  Here is a safe version of the same query using named parameters&lt;br /&gt;
  &lt;br /&gt;
  Query safeHQLQuery = session.createQuery(&amp;quot;from Inventory where productID=:productid&amp;quot;);&lt;br /&gt;
  safeHQLQuery.setParameter(&amp;quot;productid&amp;quot;, userSuppliedParameter);&lt;br /&gt;
&lt;br /&gt;
For examples of parameterized queries in other languages, including Ruby, PHP, Cold Fusion, and Perl, see the [[Query Parameterization Cheat Sheet]] or http://bobby-tables.com/.&lt;br /&gt;
&lt;br /&gt;
Developers tend to like the Prepared Statement approach because all the SQL code stays within the application. This makes your application relatively database independent.&lt;br /&gt;
&lt;br /&gt;
== Defense Option 2: Stored Procedures ==&lt;br /&gt;
 &lt;br /&gt;
Stored procedures are not always safe from SQL injection. However, certain standard stored procedure programming constructs have the same effect as the use of parameterized queries when implemented safely* which is the norm for most stored procedure languages. They require the developer to just build SQL statements with parameters which are automatically parameterized unless the developer does something largely out of the norm. The difference between prepared statements and stored procedures is that the SQL code for a stored procedure is defined and stored in the database itself, and then called from the application. Both of these techniques have the same effectiveness in preventing SQL injection so your organization should choose which approach makes the most sense for you.&lt;br /&gt;
 	&lt;br /&gt;
&amp;amp;#42;Note: 'Implemented safely' means the stored procedure does not include any unsafe dynamic SQL generation. Developers do not usually generate dynamic SQL inside stored procedures. However, it can be done, but should be avoided. If it can't be avoided, the stored procedure must use input validation or proper escaping as described in this article to make sure that all user supplied input to the stored procedure can't be used to inject SQL code into the dynamically generated query. Auditors should always look for uses of sp_execute, execute or exec within SQL Server stored procedures. Similar audit guidelines are necessary for similar functions for other vendors.&lt;br /&gt;
 &lt;br /&gt;
There are also several cases where stored procedures can increase risk.  For example, on MS SQL server, you have 3 main default roles: db_datareader, db_datawriter and db_owner. Before stored procedures came into use, DBA's would give db_datareader or db_datawriter rights to the webservice's user, depending on the requirements. However, stored procedures require execute rights, a role that is not available by default. Some setups where the user management has been centralized, but is limited to those 3 roles, cause all web apps to run under db_owner rights so stored procedures can work. Naturally, that means that if a server is breached the attacker has full rights to the database, where previously they might only have had read-access. More on this topic here. http://www.sqldbatips.com/showarticle.asp?ID=8&lt;br /&gt;
&lt;br /&gt;
;Safe Java Stored Procedure Example&lt;br /&gt;
&lt;br /&gt;
The following code example uses a CallableStatement, Java's implementation of the stored procedure interface, to execute the same database query. The &amp;quot;sp_getAccountBalance&amp;quot; stored procedure would have to be predefined in the database and implement the same functionality as the query defined above.&lt;br /&gt;
 &lt;br /&gt;
  String custname = request.getParameter(&amp;quot;customerName&amp;quot;); // This should REALLY be validated&lt;br /&gt;
  try {&lt;br /&gt;
  	'''CallableStatement cs = connection.prepareCall(&amp;quot;{call sp_getAccountBalance(?)}&amp;quot;);'''&lt;br /&gt;
  	'''cs.setString(1, custname);'''&lt;br /&gt;
  	ResultSet results = cs.executeQuery();		&lt;br /&gt;
  	// … result set handling &lt;br /&gt;
  } catch (SQLException se) {			&lt;br /&gt;
  	// … logging and error handling&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
;Safe VB .NET Stored Procedure Example	&lt;br /&gt;
&lt;br /&gt;
The following code example uses a SqlCommand, .NET’s implementation of the stored procedure interface, to execute the same database query. The &amp;quot;sp_getAccountBalance&amp;quot; stored procedure would have to be predefined in the database and implement the same functionality as the query defined above.&lt;br /&gt;
 &lt;br /&gt;
  Try&lt;br /&gt;
  	Dim command As SqlCommand = new SqlCommand(&amp;quot;sp_getAccountBalance&amp;quot;, connection)&lt;br /&gt;
  	'''command.CommandType = CommandType.StoredProcedure'''&lt;br /&gt;
  	'''command.Parameters.Add(new SqlParameter(&amp;quot;@CustomerName&amp;quot;, CustomerName.Text))'''&lt;br /&gt;
  	Dim reader As SqlDataReader = command.ExecuteReader()&lt;br /&gt;
  	‘ …&lt;br /&gt;
  Catch se As SqlException &lt;br /&gt;
  	‘ error handling&lt;br /&gt;
  End Try&lt;br /&gt;
&lt;br /&gt;
== Defense Option 3: White List Input Validation ==&lt;br /&gt;
&lt;br /&gt;
Various parts of SQL queries aren't legal locations for the use of bind variables, such as the names of tables or columns, and the sort order indicator (ASC or DESC). In such situations, input validation or query redesign is the most appropriate defense. For the names of tables or columns, ideally those values come from the code, and not from user parameters. But if user parameter values are used to make different for table names and column names, then the parameter values should be mapped to the legal/expected table or column names to make sure unvalidated user input doesn't end up in the query. Please note, this is a symptom of poor design and a full re-write should be considered if time allows. Here is an example of table name validation.&lt;br /&gt;
&lt;br /&gt;
  String tableName;&lt;br /&gt;
  switch(PARAM):&lt;br /&gt;
    case &amp;quot;Value1&amp;quot;: tableName = &amp;quot;fooTable&amp;quot;;&lt;br /&gt;
                   break;&lt;br /&gt;
    case &amp;quot;Value2&amp;quot;: tableName = &amp;quot;barTable&amp;quot;;&lt;br /&gt;
                   break;&lt;br /&gt;
      ...&lt;br /&gt;
    default      : throw new InputValidationException(&amp;quot;unexpected value provided for table name&amp;quot;);&lt;br /&gt;
&lt;br /&gt;
The tableName can then be directly appended to the SQL query since it is now known to be one of the legal and expected values for a table name in this query. Keep in mind that generic table validation functions can lead to data loss as table names are used in queries where they are not expected.&lt;br /&gt;
&lt;br /&gt;
For something simple like a sort order, it would be best if the user supplied input is converted to a boolean, and then that boolean is used to select the safe value to append to the query. This is a very standard need in dynamic query creation. For example:&lt;br /&gt;
&lt;br /&gt;
  public String someMethod(boolean sortOrder) {&lt;br /&gt;
  &lt;br /&gt;
  String SQLquery = &amp;quot;some SQL ... order by Salary &amp;quot; + (sortOrder ? &amp;quot;ASC&amp;quot; : &amp;quot;DESC&amp;quot;);&lt;br /&gt;
  ...&lt;br /&gt;
&lt;br /&gt;
Any time user input can be converted to a non-String, like a date, numeric, boolean, enumerated type, etc. before it is appended to a query, or used to select a value to append to the query, this ensures it is safe to do so.&lt;br /&gt;
&lt;br /&gt;
Input validation is also recommended as a secondary defense in ALL cases, even when using bind variables as is discussed later in this article. More techniques on how to implement strong white list input validation is described in the [[Input Validation Cheat Sheet]].&lt;br /&gt;
&lt;br /&gt;
==Defense Option 4: Escaping All User-Supplied Input==&lt;br /&gt;
&lt;br /&gt;
This technique should only be used as a last resort, when none of the above are feasible. Input validation is probably a better choice as this methodology is frail compared to other defenses and we cannot guarantee it will prevent all SQL Injection in all situations. &lt;br /&gt;
&lt;br /&gt;
This technique is to escape user input before putting it in a query. It is very database specific in its implementation. It's usually only recommended to retrofit legacy code when implementing input validation isn't cost effective. Applications built from scratch, or applications requiring low risk tolerance should be built or re-written using parameterized queries, stored procedures, or some kind of Object Relational Mapper (ORM) that builds your queries for you.&lt;br /&gt;
&lt;br /&gt;
This technique works like this. Each DBMS supports one or more character escaping schemes specific to certain kinds of queries. If you then escape all user supplied input using the proper escaping scheme for the database you are using, the DBMS will not confuse that input with SQL code written by the developer, thus avoiding any possible SQL injection vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
The OWASP Enterprise Security API (ESAPI) is a free, open source, web application security control library that makes it easier for programmers to write lower-risk applications. The ESAPI libraries are designed to make it easier for programmers to retrofit security into existing applications. The ESAPI libraries also serve as a solid foundation for new development.&lt;br /&gt;
&lt;br /&gt;
* Full details on [https://www.owasp.org/index.php/Category:OWASP_Enterprise_Security_API ESAPI are available here on OWASP].&lt;br /&gt;
* The javadoc for [http://www.javadoc.io/doc/org.owasp.esapi/esapi/2.1.0 ESAPI 2.x (Legacy) is available]. This code was migrated to GitHub in November 2014.&lt;br /&gt;
* Directly [http://code.google.com/p/owasp-esapi-java/source/browse/#svn/trunk/src/main/java/org/owasp/esapi browse the source for ESAPI for Java 2.x (Legacy) at GitHub], which is frequently helpful if the javadoc isn't perfectly clear.&lt;br /&gt;
* Directly [[Https://github.com/ESAPI/esapi-java|browse the source for ESAPI for Java 3.x (Active) at GitHub]].&lt;br /&gt;
&lt;br /&gt;
To find the javadoc specifically for the database encoders, click on the ‘Codec’ class on the left hand side. There are lots of Codecs implemented. The two Database specific codecs are OracleCodec, and MySQLCodec.&lt;br /&gt;
&lt;br /&gt;
Just click on their names in the ‘All Known Implementing Classes:’ at the top of the Interface Codec page.&lt;br /&gt;
&lt;br /&gt;
At this time, ESAPI currently has database encoders for:&lt;br /&gt;
* Oracle&lt;br /&gt;
* MySQL (Both ANSI and native modes are supported)&lt;br /&gt;
&lt;br /&gt;
Database encoders are forthcoming for:&lt;br /&gt;
* SQL Server&lt;br /&gt;
* PostgreSQL&lt;br /&gt;
&lt;br /&gt;
If your database encoder is missing, please let us know.&lt;br /&gt;
&lt;br /&gt;
===Database Specific Escaping Details===&lt;br /&gt;
&lt;br /&gt;
If you want to build your own escaping routines, here are the escaping details for each of the databases that we have developed ESAPI Encoders for:&lt;br /&gt;
* Oracle&lt;br /&gt;
* SQL Server&lt;br /&gt;
* DB2&lt;br /&gt;
* SQLi in PHP&lt;br /&gt;
&lt;br /&gt;
====Oracle Escaping====&lt;br /&gt;
&lt;br /&gt;
This information is based on the Oracle Escape character information found here: http://www.orafaq.com/wiki/SQL_FAQ#How_does_one_escape_special_characters_when_writing_SQL_queries.3F&lt;br /&gt;
&lt;br /&gt;
=====Escaping Dynamic Queries=====&lt;br /&gt;
&lt;br /&gt;
To use an ESAPI database codec is pretty simple. An Oracle example looks something like:&lt;br /&gt;
  ESAPI.encoder().encodeForSQL( new OracleCodec(), queryparam );&lt;br /&gt;
&lt;br /&gt;
So, if you had an existing Dynamic query being generated in your code that was going to Oracle that looked like this:&lt;br /&gt;
&lt;br /&gt;
  String query = &amp;quot;SELECT user_id FROM user_data WHERE user_name = '&amp;quot; + req.getParameter(&amp;quot;userID&amp;quot;) &lt;br /&gt;
  + &amp;quot;' and user_password = '&amp;quot; + req.getParameter(&amp;quot;pwd&amp;quot;) +&amp;quot;'&amp;quot;;&lt;br /&gt;
  try {&lt;br /&gt;
      Statement statement = connection.createStatement( … );&lt;br /&gt;
      ResultSet results = statement.executeQuery( query );&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
You would rewrite the first line to look like this:&lt;br /&gt;
&lt;br /&gt;
 '''Codec ORACLE_CODEC = new OracleCodec();'''&lt;br /&gt;
  String query = &amp;quot;SELECT user_id FROM user_data WHERE user_name = '&amp;quot; + &lt;br /&gt;
    '''ESAPI.encoder().encodeForSQL( ORACLE_CODEC, req.getParameter(&amp;quot;userID&amp;quot;))''' + &amp;quot;' and user_password = '&amp;quot;&lt;br /&gt;
    + '''ESAPI.encoder().encodeForSQL( ORACLE_CODEC, req.getParameter(&amp;quot;pwd&amp;quot;))''' +&amp;quot;'&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
And it would now be safe from SQL injection, regardless of the input supplied.&lt;br /&gt;
&lt;br /&gt;
For maximum code readability, you could also construct your own OracleEncoder.&lt;br /&gt;
&lt;br /&gt;
  Encoder oe = new OracleEncoder();&lt;br /&gt;
  String query = &amp;quot;SELECT user_id FROM user_data WHERE user_name = '&amp;quot; &lt;br /&gt;
    + '''oe.encode( req.getParameter(&amp;quot;userID&amp;quot;))''' + &amp;quot;' and user_password = '&amp;quot; &lt;br /&gt;
    + '''oe.encode( req.getParameter(&amp;quot;pwd&amp;quot;))''' +&amp;quot;'&amp;quot;;&lt;br /&gt;
&lt;br /&gt;
With this type of solution, you would need only to wrap each user-supplied parameter being passed into an '''ESAPI.encoder().encodeForOracle( )''' call or whatever you named the call and you would be done.&lt;br /&gt;
&lt;br /&gt;
=====Turn off character replacement=====&lt;br /&gt;
&lt;br /&gt;
Use SET DEFINE OFF or SET SCAN OFF to ensure that automatic character replacement is turned off. If this character replacement is turned on, the &amp;amp; character will be treated like a SQLPlus variable prefix that could allow an attacker to retrieve private data. &lt;br /&gt;
&lt;br /&gt;
See http://download.oracle.com/docs/cd/B19306_01/server.102/b14357/ch12040.htm#i2698854 and http://stackoverflow.com/questions/152837/how-to-insert-a-string-which-contains-an for more information&lt;br /&gt;
&lt;br /&gt;
=====Escaping Wildcard characters in Like Clauses=====&lt;br /&gt;
&lt;br /&gt;
The LIKE keyword allows for text scanning searches. In Oracle, the underscore '_' character matches only one character, while the ampersand '%' is used to match zero or more occurrences of any characters. These characters must be escaped in LIKE clause criteria. For example:&lt;br /&gt;
&lt;br /&gt;
 SELECT name FROM emp &lt;br /&gt;
 WHERE id LIKE '%/_%' ESCAPE '/';&lt;br /&gt;
&lt;br /&gt;
 SELECT name FROM emp &lt;br /&gt;
 WHERE id LIKE '%\%%' ESCAPE '\';&lt;br /&gt;
&lt;br /&gt;
=====Oracle 10g escaping=====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;An alternative for Oracle 10g and later is to place { and } around the string to escape the entire string. However, you have to be careful that there isn't a } character already in the string. You must search for these and if there is one, then you must replace it with }}. Otherwise that character will end the escaping early, and may introduce a vulnerability.&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
====MySQL Escaping====&lt;br /&gt;
&lt;br /&gt;
MySQL supports two escaping modes:&lt;br /&gt;
&lt;br /&gt;
# ANSI_QUOTES SQL mode, and a mode with this off, which we call&lt;br /&gt;
# MySQL mode.&lt;br /&gt;
&lt;br /&gt;
ANSI SQL mode: Simply encode all ' (single tick) characters with '&amp;amp;#39; (two single ticks)&lt;br /&gt;
&lt;br /&gt;
MySQL mode, do the following:&lt;br /&gt;
&lt;br /&gt;
  NUL (0x00) --&amp;gt; \0  [This is a zero, not the letter O]&lt;br /&gt;
  BS  (0x08) --&amp;gt; \b&lt;br /&gt;
  TAB (0x09) --&amp;gt; \t&lt;br /&gt;
  LF  (0x0a) --&amp;gt; \n&lt;br /&gt;
  CR  (0x0d) --&amp;gt; \r&lt;br /&gt;
  SUB (0x1a) --&amp;gt; \Z&lt;br /&gt;
  &amp;quot;   (0x22) --&amp;gt; \&amp;quot;&lt;br /&gt;
  %   (0x25) --&amp;gt; \%&lt;br /&gt;
  '   (0x27) --&amp;gt; \'&lt;br /&gt;
  \   (0x5c) --&amp;gt; \\&lt;br /&gt;
  _   (0x5f) --&amp;gt; \_ &lt;br /&gt;
  all other non-alphanumeric characters with ASCII values less than 256  --&amp;gt; \c&lt;br /&gt;
  where 'c' is the original non-alphanumeric character.&lt;br /&gt;
&lt;br /&gt;
This information is based on the MySQL Escape character information found here: http://mirror.yandex.ru/mirrors/ftp.mysql.com/doc/refman/5.0/en/string-syntax.html&lt;br /&gt;
&lt;br /&gt;
====SQL Server Escaping====&lt;br /&gt;
&lt;br /&gt;
We have not implemented the SQL Server escaping routine yet, but the following has good pointers and links to articles describing how to prevent SQL injection attacks on SQL server&lt;br /&gt;
* http://blogs.msdn.com/raulga/archive/2007/01/04/dynamic-sql-sql-injection.aspx&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====DB2 Escaping====&lt;br /&gt;
This information is based on DB2 WebQuery special characters found here:  https://www-304.ibm.com/support/docview.wss?uid=nas14488c61e3223e8a78625744f00782983&lt;br /&gt;
as well as some information from Oracle's JDBC DB2 driver found here:&lt;br /&gt;
http://docs.oracle.com/cd/E12840_01/wls/docs103/jdbc_drivers/sqlescape.html&lt;br /&gt;
&lt;br /&gt;
Information in regards to differences between several DB2 Universal drivers can be found here:  http://publib.boulder.ibm.com/infocenter/db2luw/v8/index.jsp?topic=/com.ibm.db2.udb.doc/ad/rjvjcsqc.htm&lt;br /&gt;
&lt;br /&gt;
===Hex-encoding all input===&lt;br /&gt;
&lt;br /&gt;
A somewhat special case of escaping is the process of hex-encode the entire string received from the user (this can be seen as escaping every character).  The web application should hex-encode the user input before including it in the SQL statement.  The SQL statement should take into account this fact, and accordingly compare the data. For example, if we have to look up a record matching a sessionID, and the user transmitted the string abc123 as the session ID, the select statement would be:&lt;br /&gt;
&lt;br /&gt;
    SELECT ... FROM session&lt;br /&gt;
    WHERE hex_encode (sessionID) = '616263313233'&lt;br /&gt;
&lt;br /&gt;
(hex_encode should be replaced by the particular facility for the database being used.)  The string 606162313233 is the hex encoded version of the string received from the user (it is the sequence of hex values of the ASCII/UTF-8 codes of the user data).&lt;br /&gt;
&lt;br /&gt;
If an attacker were to transmit a string containing a single-quote character followed by their attempt to inject SQL code, the constructed SQL statement will only look like:&lt;br /&gt;
&lt;br /&gt;
    WHERE hex_encode ( ... ) = '2720 ... '&lt;br /&gt;
&lt;br /&gt;
27 being the ASCII code (in hex) of the single-quote, which is simply hex-encoded like any other character in the string.  The resulting SQL can only contain numeric digits and letters a to f, and never any special character that could enable an SQL injection.&lt;br /&gt;
&lt;br /&gt;
===Escaping SQLi in PHP===&lt;br /&gt;
&lt;br /&gt;
Use prepared statements and parameterized queries. These are SQL statements that are sent to and parsed by the database server separately from any parameters. This way it is impossible for an attacker to inject malicious SQL.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;You basically have two options to achieve this:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1. Using [http://php.net/manual/en/book.pdo.php PDO] (for any supported database driver):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$stmt = $pdo-&amp;gt;prepare('SELECT * FROM employees WHERE name = :name');&lt;br /&gt;
&lt;br /&gt;
$stmt-&amp;gt;execute(array('name' =&amp;gt; $name));&lt;br /&gt;
&lt;br /&gt;
foreach ($stmt as $row) {&lt;br /&gt;
    // do something with $row&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
2. Using [http://php.net/manual/en/book.mysqli.php MySQLi] (for MySQL):&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$stmt = $dbConnection-&amp;gt;prepare('SELECT * FROM employees WHERE name = ?');&lt;br /&gt;
$stmt-&amp;gt;bind_param('s', $name);&lt;br /&gt;
&lt;br /&gt;
$stmt-&amp;gt;execute();&lt;br /&gt;
&lt;br /&gt;
$result = $stmt-&amp;gt;get_result();&lt;br /&gt;
while ($row = $result-&amp;gt;fetch_assoc()) {&lt;br /&gt;
    // do something with $row&lt;br /&gt;
}&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
PDO is the universal option. If you're connecting to a database other than MySQL, you can refer to a driver-specific second option (e.g. pg_prepare() and pg_execute() for PostgreSQL). &lt;br /&gt;
&lt;br /&gt;
= Additional Defenses =&lt;br /&gt;
&lt;br /&gt;
Beyond adopting one of the four primary defenses, we also recommend adopting all of these additional defenses in order to provide defense in depth. These additional defenses are:&lt;br /&gt;
&lt;br /&gt;
* '''Least Privilege'''&lt;br /&gt;
* '''White List Input Validation'''&lt;br /&gt;
&lt;br /&gt;
== Least Privilege ==&lt;br /&gt;
&lt;br /&gt;
To minimize the potential damage of a successful SQL injection attack, you should minimize the privileges assigned to every database account in your environment. Do not assign DBA or admin type access rights to your application accounts. We understand that this is easy, and everything just ‘works’ when you do it this way, but it is very dangerous. Start from the ground up to determine what access rights your application accounts require, rather than trying to figure out what access rights you need to take away. Make sure that accounts that only need read access are only granted read access to the tables they need access to. If an account only needs access to portions of a table, consider creating a view that limits access to that portion of the data and assigning the account access to the view instead, rather than the underlying table. Rarely, if ever, grant create or delete access to database accounts.&lt;br /&gt;
&lt;br /&gt;
If you adopt a policy where you use stored procedures everywhere, and don’t allow application accounts to directly execute their own queries, then restrict those accounts to only be able to execute the stored procedures they need. Don’t grant them any rights directly to the tables in the database.&lt;br /&gt;
&lt;br /&gt;
SQL injection is not the only threat to your database data. Attackers can simply change the parameter values from one of the legal values they are presented with, to a value that is unauthorized for them, but the application itself might be authorized to access. As such, minimizing the privileges granted to your application will reduce the likelihood of such unauthorized access attempts, even when an attacker is not trying to use SQL injection as part of their exploit.&lt;br /&gt;
&lt;br /&gt;
While you are at it, you should minimize the privileges of the operating system account that the DBMS runs under. Don't run your DBMS as root or system! Most DBMSs run out of the box with a very powerful system account. For example, MySQL runs as system on Windows by default! Change the DBMS's OS account to something more appropriate, with restricted privileges.&lt;br /&gt;
&lt;br /&gt;
=== Multiple DB Users ===&lt;br /&gt;
&lt;br /&gt;
The designer of web applications should not only avoid using the same owner/admin account in the web applications to connect to the database. Different DB users could be used for different web applications. In general, each separate web application that requires access to the database could have a designated database user account that the web-app will use to connect to the DB. That way, the designer of the application can have good granularity in the access control, thus reducing the privileges as much as possible. Each DB user will then have select access to what it needs only, and write-access as needed.&lt;br /&gt;
&lt;br /&gt;
As an example, a login page requires read access to the username and password fields of a table, but no write access of any form (no insert, update, or delete). However, the sign-up page certainly requires insert privilege to that table; this restriction can only be enforced if these web apps use different DB users to connect to the database.&lt;br /&gt;
&lt;br /&gt;
=== Views ===&lt;br /&gt;
&lt;br /&gt;
You can use SQL views to further increase the granularity of access by limiting the read access to specific fields of a table or joins of tables. It could potentially have additional benefits: for example, suppose that the system is required (perhaps due to some specific legal requirements) to store the passwords of the users, instead of salted-hashed passwords.  The designer could use views to compensate for this limitation; revoke all access to the table (from all DB users except the owner/admin) and create a view that outputs the hash of the password field and not the field itself.  Any SQL injection attack that succeeds in stealing DB information will be restricted to stealing the hash of the passwords (could even be a keyed hash), since no DB user for any of the web applications has access to the table itself.&lt;br /&gt;
&lt;br /&gt;
== White List Input Validation ==&lt;br /&gt;
&lt;br /&gt;
In addition to being a primary defense when nothing else is possible (e.g., when a bind variable isn't legal), input validation can also be a secondary defense used to detect unauthorized input before it is passed to the SQL query. For more information please see the [[Input Validation Cheat Sheet]]. Proceed with caution here. Validated data is not necessarily safe to insert into SQL queries via string building.&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Related Articles=&lt;br /&gt;
&lt;br /&gt;
'''SQL Injection Attack Cheat Sheets'''&lt;br /&gt;
&lt;br /&gt;
The following articles describe how to exploit different kinds of SQL Injection Vulnerabilities on various platforms that this article was created to help you avoid:&lt;br /&gt;
&lt;br /&gt;
* &amp;quot;SQL Injection Cheat Sheet&amp;quot; - http://ferruh.mavituna.com/sql-injection-cheatsheet-oku/&lt;br /&gt;
* &amp;quot;Bypassing WAF's with SQLi&amp;quot; - [[SQL Injection Bypassing WAF]]&lt;br /&gt;
&lt;br /&gt;
'''Description of SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* OWASP article on [[SQL Injection]] Vulnerabilities&lt;br /&gt;
* OWASP article on [[Blind_SQL_Injection]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''How to Avoid SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Guide Project|OWASP Developers Guide]] article on how to [[Guide to SQL Injection | Avoid SQL Injection]] Vulnerabilities&lt;br /&gt;
* OWASP Cheat Sheet that provides [[Query_Parameterization_Cheat_Sheet|numerous language specific examples of parameterized queries using both Prepared Statements and Stored Procedures]]&lt;br /&gt;
* [http://bobby-tables.com/ The Bobby Tables site (inspired by the XKCD webcomic) has numerous examples in different languages of parameterized Prepared Statements and Stored Procedures]&lt;br /&gt;
&lt;br /&gt;
'''How to Review Code for SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Code Review Project|OWASP Code Review Guide]] article on how to [[Reviewing Code for SQL Injection|Review Code for SQL Injection]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
'''How to Test for SQL Injection Vulnerabilities'''&lt;br /&gt;
&lt;br /&gt;
* [[:Category:OWASP Testing Project|OWASP Testing Guide]] article on how to [[Testing for SQL Injection (OWASP-DV-005)|Test for SQL Injection]] Vulnerabilities&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Authors and Primary Editors  =&lt;br /&gt;
&lt;br /&gt;
[[User:wichers|Dave Wichers]] - dave.wichers[at]owasp.org&amp;lt;br /&amp;gt;&lt;br /&gt;
[[User:jmanico|Jim Manico]] - jim[at]owasp.org&amp;lt;br /&amp;gt;&lt;br /&gt;
Matt Seil - mseil[at]acm.org&amp;lt;br&amp;gt;&lt;br /&gt;
[https://owasp.org/index.php/Dhiraj_Mishra Dhiraj Mishra] - mishra.dhiraj[at]owasp.org&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
== Other Cheatsheets ==&lt;br /&gt;
&lt;br /&gt;
{{Cheatsheet_Navigation_Body}}&lt;br /&gt;
&lt;br /&gt;
[[Category:Cheatsheets]]&lt;br /&gt;
[[Category:Popular]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231594</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231594"/>
				<updated>2017-07-11T23:26:39Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Again, Welcome! */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
== Social Channels ==&lt;br /&gt;
Let's stay connected!&lt;br /&gt;
&lt;br /&gt;
Meetup: https://www.meetup.com/dc3782c2-4995-4ba5-b551-1d24eb7583ac/ &lt;br /&gt;
&lt;br /&gt;
LinkedIn: https://www.linkedin.com/groups/4879966/profile &lt;br /&gt;
&lt;br /&gt;
Twitter: @BaltimoreOWASP (https://twitter.com/BaltimoreOWASP) &lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-baltimore&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us with questions or interest in sponsorship, speaking, or offering space. We welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
Considering becoming a leader or volunteer? Prior to participating, please review the Chapter_Leader_Handbook. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be publicly viewed, in the interest of transparency and accountability: https://docs.google.com/spreadsheets/d/11acTOmtmBGq6-5CIGsjlEByU8POSGqda0r23VNnhEGQ/pub?hl=en_US&amp;amp;hl=en_US&amp;amp;hl=en_US&amp;amp;output=html&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon (posted July 2017)&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7, 2013 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3, 2013 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11, 2013 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6, 2013 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2, 2013 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4, 2013 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Again, Welcome!  ==&lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list, attend chapter meetings, and reach out to chapter leaders. Join us as we pursue the OWASP mission: to make application security visible. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231592</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231592"/>
				<updated>2017-07-11T23:20:52Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
== Social Channels ==&lt;br /&gt;
Let's stay connected!&lt;br /&gt;
&lt;br /&gt;
Meetup: https://www.meetup.com/dc3782c2-4995-4ba5-b551-1d24eb7583ac/ &lt;br /&gt;
&lt;br /&gt;
LinkedIn: https://www.linkedin.com/groups/4879966/profile &lt;br /&gt;
&lt;br /&gt;
Twitter: @BaltimoreOWASP (https://twitter.com/BaltimoreOWASP) &lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-baltimore&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us with questions or interest in sponsorship, speaking, or offering space. We welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
Considering becoming a leader or volunteer? Prior to participating, please review the Chapter_Leader_Handbook. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be publicly viewed, in the interest of transparency and accountability: https://docs.google.com/spreadsheets/d/11acTOmtmBGq6-5CIGsjlEByU8POSGqda0r23VNnhEGQ/pub?hl=en_US&amp;amp;hl=en_US&amp;amp;hl=en_US&amp;amp;output=html&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon (posted July 2017)&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7, 2013 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3, 2013 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11, 2013 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6, 2013 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2, 2013 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4, 2013 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Again, Welcome!  ==&lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list, attend chapter meetings, and reach out to chapter leaders. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231591</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231591"/>
				<updated>2017-07-11T23:19:26Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Social Channels */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
== Social Channels ==&lt;br /&gt;
Let's stay connected!&lt;br /&gt;
&lt;br /&gt;
Meetup: https://www.meetup.com/dc3782c2-4995-4ba5-b551-1d24eb7583ac/ &lt;br /&gt;
&lt;br /&gt;
LinkedIn: https://www.linkedin.com/groups/4879966/profile &lt;br /&gt;
&lt;br /&gt;
Twitter: @BaltimoreOWASP (https://twitter.com/BaltimoreOWASP) &lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-baltimore&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us with questions or interest in sponsorship, speaking, or offering space. We welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
Considering becoming a leader or volunteer? Prior to participating, please review the Chapter_Leader_Handbook. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be publicly viewed, in the interest of transparency and accountability: https://docs.google.com/spreadsheets/d/11acTOmtmBGq6-5CIGsjlEByU8POSGqda0r23VNnhEGQ/pub?hl=en_US&amp;amp;hl=en_US&amp;amp;hl=en_US&amp;amp;output=html&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon (posted July 2017)&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7, 2013 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3, 2013 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11, 2013 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6, 2013 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2, 2013 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4, 2013 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you have a question or are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231590</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231590"/>
				<updated>2017-07-11T23:17:10Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Social Channels */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
== Social Channels ==&lt;br /&gt;
Let's stay connected!&lt;br /&gt;
&lt;br /&gt;
Meetup: https://www.meetup.com/dc3782c2-4995-4ba5-b551-1d24eb7583ac/ &lt;br /&gt;
&lt;br /&gt;
LinkedIn: https://www.linkedin.com/groups/4879966/profile &lt;br /&gt;
&lt;br /&gt;
Twitter: @BaltimoreOWASP (https://twitter.com/BaltimoreOWASP) &lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-baltimore&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us with questions or interest in sponsorship, speaking, or offering space. We welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
Considering becoming a leader or volunteer? Prior to participating, please review the Chapter_Leader_Handbook. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be publicly viewed, in the interest of transparency and accountability.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon (posted July 2017)&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7, 2013 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3, 2013 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11, 2013 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6, 2013 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2, 2013 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4, 2013 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you have a question or are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231589</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231589"/>
				<updated>2017-07-11T23:15:12Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Welcome to OWASP Baltimore */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
== Social Channels ==&lt;br /&gt;
Let's stay connected!&lt;br /&gt;
&lt;br /&gt;
Meetup: https://www.meetup.com/dc3782c2-4995-4ba5-b551-1d24eb7583ac/ &lt;br /&gt;
&lt;br /&gt;
LinkedIn: https://www.linkedin.com/groups/4879966/profile &lt;br /&gt;
&lt;br /&gt;
Twitter: @BaltimoreOWASP (https://twitter.com/BaltimoreOWASP) &lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-baltimore&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us with questions or interest in sponsorship, speaking, or offering space. We welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.&lt;br /&gt;
&lt;br /&gt;
Chapter volunteers: prior to participating with OWASP, please review the Chapter_Leader_Handbook. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be publicly viewed, in the interest of transparency.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon (posted July 2017)&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7, 2013 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3, 2013 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11, 2013 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6, 2013 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2, 2013 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4, 2013 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you have a question or are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231588</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231588"/>
				<updated>2017-07-11T23:12:26Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Welcome to OWASP Baltimore */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers: prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be [https://docs.google.com/spreadsheets/d/11acTOmtmBGq6-5CIGsjlEByU8POSGqda0r23VNnhEGQ/pub?hl=en_US&amp;amp;hl=en_US&amp;amp;hl=en_US&amp;amp;output=html publicly viewed], in the interest of transparency. &lt;br /&gt;
&lt;br /&gt;
== Social Channels ==&lt;br /&gt;
Let's stay connected!&lt;br /&gt;
&lt;br /&gt;
Meetup: https://www.meetup.com/dc3782c2-4995-4ba5-b551-1d24eb7583ac/ &lt;br /&gt;
&lt;br /&gt;
LinkedIn: https://www.linkedin.com/groups/4879966/profile &lt;br /&gt;
&lt;br /&gt;
Twitter: @BaltimoreOWASP (https://twitter.com/BaltimoreOWASP) &lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-baltimore&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us with questions or interest in sponsorship, speaking, or offering space. We welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon (posted July 2017)&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7, 2013 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3, 2013 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11, 2013 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6, 2013 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2, 2013 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4, 2013 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you have a question or are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231587</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231587"/>
				<updated>2017-07-11T23:10:25Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Welcome to OWASP Baltimore */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers: prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be [https://docs.google.com/spreadsheets/d/11acTOmtmBGq6-5CIGsjlEByU8POSGqda0r23VNnhEGQ/pub?hl=en_US&amp;amp;hl=en_US&amp;amp;hl=en_US&amp;amp;output=html publicly viewed], in the interest of transparency. &lt;br /&gt;
&lt;br /&gt;
== Social Channels ==&lt;br /&gt;
Let's stay connected!&lt;br /&gt;
&lt;br /&gt;
Meetup: https://www.meetup.com/dc3782c2-4995-4ba5-b551-1d24eb7583ac/ &lt;br /&gt;
&lt;br /&gt;
LinkedIn: https://www.linkedin.com/groups/4879966/profile &lt;br /&gt;
&lt;br /&gt;
Twitter: @BaltimoreOWASP (https://twitter.com/BaltimoreOWASP) &lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-baltimore&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon (posted July 2017)&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7, 2013 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3, 2013 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11, 2013 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6, 2013 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2, 2013 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4, 2013 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you have a question or are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231586</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231586"/>
				<updated>2017-07-11T23:09:59Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Social Channels */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be [https://docs.google.com/spreadsheets/d/11acTOmtmBGq6-5CIGsjlEByU8POSGqda0r23VNnhEGQ/pub?hl=en_US&amp;amp;hl=en_US&amp;amp;hl=en_US&amp;amp;output=html publicly viewed], in the interest of transparency. &lt;br /&gt;
&lt;br /&gt;
== Social Channels ==&lt;br /&gt;
Let's stay connected!&lt;br /&gt;
&lt;br /&gt;
Meetup: https://www.meetup.com/dc3782c2-4995-4ba5-b551-1d24eb7583ac/ &lt;br /&gt;
&lt;br /&gt;
LinkedIn: https://www.linkedin.com/groups/4879966/profile &lt;br /&gt;
&lt;br /&gt;
Twitter: @BaltimoreOWASP (https://twitter.com/BaltimoreOWASP) &lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-baltimore&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon (posted July 2017)&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7, 2013 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3, 2013 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11, 2013 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6, 2013 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2, 2013 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4, 2013 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you have a question or are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231585</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231585"/>
				<updated>2017-07-11T23:08:16Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Recent Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be [https://docs.google.com/spreadsheets/d/11acTOmtmBGq6-5CIGsjlEByU8POSGqda0r23VNnhEGQ/pub?hl=en_US&amp;amp;hl=en_US&amp;amp;hl=en_US&amp;amp;output=html publicly viewed], in the interest of transparency. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [https://www.owasp.org/index.php/User:Chaim_sanders Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon (posted July 2017)&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7, 2013 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3, 2013 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11, 2013 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6, 2013 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2, 2013 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4, 2013 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Social Channels ==&lt;br /&gt;
Meetup: https://www.meetup.com/dc3782c2-4995-4ba5-b551-1d24eb7583ac/ &lt;br /&gt;
&lt;br /&gt;
LinkedIn: https://www.linkedin.com/groups/4879966/profile &lt;br /&gt;
&lt;br /&gt;
Twitter: @BaltimoreOWASP (https://twitter.com/BaltimoreOWASP) &lt;br /&gt;
&lt;br /&gt;
Mailing list: https://lists.owasp.org/mailman/listinfo/owasp-baltimore&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you have a question or are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231582</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231582"/>
				<updated>2017-07-11T22:56:45Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Recent Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be [https://docs.google.com/spreadsheets/d/11acTOmtmBGq6-5CIGsjlEByU8POSGqda0r23VNnhEGQ/pub?hl=en_US&amp;amp;hl=en_US&amp;amp;hl=en_US&amp;amp;output=html publicly viewed], in the interest of transparency. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7, 2013 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3, 2013 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231581</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231581"/>
				<updated>2017-07-11T22:53:42Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Recent Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be [https://docs.google.com/spreadsheets/d/11acTOmtmBGq6-5CIGsjlEByU8POSGqda0r23VNnhEGQ/pub?hl=en_US&amp;amp;hl=en_US&amp;amp;hl=en_US&amp;amp;output=html publicly viewed], in the interest of transparency. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5, 2013 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231580</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231580"/>
				<updated>2017-07-11T20:40:56Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Welcome to OWASP Baltimore */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
The chapter is fiscally sound. Our current account balance can be [https://docs.google.com/spreadsheets/d/11acTOmtmBGq6-5CIGsjlEByU8POSGqda0r23VNnhEGQ/pub?hl=en_US&amp;amp;hl=en_US&amp;amp;hl=en_US&amp;amp;output=html publicly viewed], in the interest of transparency. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231579</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231579"/>
				<updated>2017-07-11T20:15:57Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Welcome to OWASP Baltimore */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders. Membership is not required to participate.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231578</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231578"/>
				<updated>2017-07-11T20:13:51Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Welcome to OWASP Baltimore */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders.&lt;br /&gt;
&lt;br /&gt;
As already mentioned, meetings are FREE and OPEN to all interested parties.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231577</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231577"/>
				<updated>2017-07-11T20:12:27Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Welcome to OWASP Baltimore */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email our leaders.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list, [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], is open to both members and non-members and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231576</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231576"/>
				<updated>2017-07-11T20:10:12Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email us directly.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list is [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! &lt;br /&gt;
&lt;br /&gt;
Everyone -- whether a member or not -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231575</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231575"/>
				<updated>2017-07-11T20:08:28Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Welcome to OWASP Baltimore */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email us directly.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list is [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes both email address and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! Everyone -- whether a member or non-member -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231574</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231574"/>
				<updated>2017-07-11T20:07:46Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Welcome to OWASP Baltimore */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, we encourage donations of meeting space, catering, and event sponsorship. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email us directly.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list is [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives]. Please be aware that communication sent to this list are publicly visible at the archive link. This includes email addresses and the message body.|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! Everyone -- whether a member or non-member -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231573</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231573"/>
				<updated>2017-07-11T20:04:08Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: tweaks&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, donations of meeting space or refreshments sponsorship is encouraged. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email us directly.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list is [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! Everyone -- whether a member or non-member -- is welcome to join our mailing list and attend chapter meetings. Join us as we pursue the OWASP mission: to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231572</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231572"/>
				<updated>2017-07-11T20:00:12Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: /* Welcome */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome to OWASP Baltimore =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects. &lt;br /&gt;
&lt;br /&gt;
We encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, donations of meeting space or refreshments sponsorship is encouraged. Simply contact the local chapter leaders listed on this page to discuss.   &lt;br /&gt;
&lt;br /&gt;
Chapter volunteers, prior to participating with OWASP, please review the [[Chapter_Leader_Handbook]]. &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email us directly.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list is [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! Everyone -- whether a member or non-member -- is welcome to join our mailing list and chapter meetings in pursuit of the OWASP mission to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231571</id>
		<title>Baltimore</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Baltimore&amp;diff=231571"/>
				<updated>2017-07-11T19:56:16Z</updated>
		
		<summary type="html">&lt;p&gt;AnnGrove: minor edits&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
=  Welcome =&lt;br /&gt;
&lt;br /&gt;
The '''OWASP Baltimore Local Chapter''' meetings are FREE and OPEN to anyone interested in learning more about application security. We encourage individuals to provide knowledge transfer via hands-on training and presentations about OWASP projects, security research topics, and the Software Development Life Cycle. &lt;br /&gt;
&lt;br /&gt;
We the encourage vendor-agnostic presentations and individual volunteerism to enable perpetual growth. As a 501(3)c non-profit association, donations of meeting space or refreshments sponsorship is encouraged. Simply contact the local chapter leaders listed on this page to discuss. Prior to participating with OWASP, please review the Chapter Handbook. &lt;br /&gt;
&lt;br /&gt;
The chapter is committed to providing an engaging experience for a variety of audience types ranging from local students and those beginning in AppSec to experienced and accomplished professionals and researchers who are looking for competent collaborators for active OWASP-related projects.  &lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Baltimore|extra =Come see us at a chapter meeting, join the mailing list, or email us directly.&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are [mailto:Ann.Grove@OWASP.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer]. Please feel free to email one or all of us. The chapter leaders and mailing list welcome your participation and thoughts.&lt;br /&gt;
&lt;br /&gt;
The group's mailing list is [http://lists.owasp.org/mailman/listinfo/owasp-baltimore OWASP Baltimore], and its archive can be found at [http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-baltimore|emailarchives=http://lists.owasp.org/pipermail/owasp-baltimore OWASP Baltimore Archives}}&lt;br /&gt;
&lt;br /&gt;
== Recent Meetings ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! Date !! Location !! Topic !! Speaker !! More&lt;br /&gt;
|-&lt;br /&gt;
|TBD&lt;br /&gt;
|TBD&lt;br /&gt;
|Meeting coming soon&lt;br /&gt;
|TBD&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| Dec 5 || Zot Inc. || AppSec at DevOps Speed and Portfolio Scale|| Jeff Williams || [http://www.youtube.com/watch?v=cIvOth0fxmI Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Nov 7 || Unallocated Space || OWASP BWA &amp;amp; ZAP|| Chuck Willis || [https://www.owasp.org/images/5/56/OWASP_Baltimore_-_November_7th_BWA_and_ZAP_Slides.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Sept 3 || Zot Inc. || OWASP ASVS || Dave Wichers || [https://www.owasp.org/index.php/File:OWASP_Baltimore_-_September_3rd_ASVS_WebApp_Standard_2013.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| July 11 || Unallocated Space || Pen Testing Lab + CTF Exercise || Brian || -&lt;br /&gt;
|-&lt;br /&gt;
| June 6 || Aspect Security || Good Component Practice || Ryan Berg || [https://www.owasp.org/images/4/4c/OWASP_Baltimore_-_June_6th_%3D_Good_Component_Practice.pdf Slides]&lt;br /&gt;
|-&lt;br /&gt;
| May 2 || SourceFire Inc. || Certificate &amp;amp; Public Key Pinning || Jeffrey Walton || [https://www.owasp.org/images/9/90/OWASP_Baltimore_-_May_2nd_%3D_Securing_Wireless_Channels.ppt Slides]&lt;br /&gt;
|-&lt;br /&gt;
| Apr 4 || SourceFire Inc. || Meet &amp;amp; Greet / OWASP Overview || Shawn Webb || -&lt;br /&gt;
|}&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
The chapter leaders are interested in hearing from you if you are interested in sponsoring, offering a meeting space, or speaking. Please contact any or all of us if interested: [mailto:ann.grove@owasp.org Ann Grove], [mailto:Chaim.Sanders@OWASP.org Chaim Sanders], and [mailto:Brad.Scherer@OWASP.org Brad Scherer].&lt;br /&gt;
&lt;br /&gt;
We are also in a drive for membership. If you know someone with an interest in application security, be sure to pass on the chapter contacts! Everyone -- whether a member or non-member -- is welcome to join our mailing list and chapter meetings in pursuit of the OWASP mission to make application security visible.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Maryland]]&lt;/div&gt;</summary>
		<author><name>AnnGrove</name></author>	</entry>

	</feed>