<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ariesel</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ariesel"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ariesel"/>
		<updated>2026-04-22T12:19:23Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boulder&amp;diff=64842</id>
		<title>Boulder</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boulder&amp;diff=64842"/>
				<updated>2009-06-24T19:20:06Z</updated>
		
		<summary type="html">&lt;p&gt;Ariesel: /* Next Meeting - XSS Lab - Postponed until August 20th, 2009 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boulder|extra=The chapter leaders are [mailto:kthaxton@businesspartnersolutions.com Kathy Thaxton], [mailto:mrhits777@gmail.com Jeremy Martinez], and [mailto:Andrew.Riesel@GMail.com Andrew Riesel]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-boulder|emailarchives=http://lists.owasp.org/pipermail/owasp-boulder}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boulder&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Next Meeting - XSS Lab - Postponed until August 20th, 2009''' ==&lt;br /&gt;
Due to some location security issues we must postpone the June meeting until August.  We will finish the Cross Site Scripting lab on August 20th, 2009 and we will be using a Broomfield location rather that a Fort Collins location.&lt;br /&gt;
&lt;br /&gt;
The good news is we have some new sites to attack and defend with the help of Anurag Agarwal, the Director of Education at WhiteHat Security and we will have a much more intense lab.&lt;br /&gt;
We wholeheartedly apologize for the delay but it will be worth the wait.  &lt;br /&gt;
&lt;br /&gt;
Please join the Boulder OWASP Chapter on Thursday, August 20th, 2009 at Staples for a XSS lab.&lt;br /&gt;
THREE levels of labs - beginner, intermediate, and advanced.&lt;br /&gt;
&lt;br /&gt;
=== Cross-site scripting '''LAB''' - Beginner, Intermediate, and Advanced ===&lt;br /&gt;
&lt;br /&gt;
Lab to explain how to attack vulnerable sites –we will use three different examples and &lt;br /&gt;
Spend  one half hour on each:  Basic attacks, intermediate and advanced.&lt;br /&gt;
Teacher TBA.&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at '''Staples:  [http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&amp;amp;sa=X&amp;amp;oi=map&amp;amp;ct=title One Environmental Way, Broomfield, Co. 80021]'''&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (we’ll choose one)&lt;br /&gt;
&lt;br /&gt;
Black Hat DC researchers demonstrate new cross-site scripting browser hack that lets attackers retrieve data without a trace&lt;br /&gt;
[http://developers.slashdot.org/article.pl?sid=09/05/09/1339213 Should Developers Be Liable For Their Code?]&lt;br /&gt;
&lt;br /&gt;
==== Resources from the Meeting - Stuff you Wish You'd Been There to Hear About :-) ====&lt;br /&gt;
[http://ha.ckers.org/xss.html RSnake's XSS Cheat-sheet]&lt;br /&gt;
&lt;br /&gt;
=== Directions to Staples: ===&lt;br /&gt;
&lt;br /&gt;
'''Staples:  [http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&amp;amp;sa=X&amp;amp;oi=map&amp;amp;ct=title One Environmental Way, Broomfield, Co. 80021]'''&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6 to 7:00 Dinner @ [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Corporate+Express+1+Environmental+Way,+Broomfield+colorado&amp;amp;sll=39.935803,-105.13092&amp;amp;sspn=0.077395,0.144711&amp;amp;ie=UTF8&amp;amp;ll=39.926934,-105.126565&amp;amp;spn=0.009676,0.018089&amp;amp;z=16&amp;amp;iwloc=A Staples CE - Broomfield] &lt;br /&gt;
&lt;br /&gt;
* 7pm to 8:30 pm Cross-site scripting lab&lt;br /&gt;
Sponsor:  '''Nope, no sponsor.  It'a your chapter, BYO dinner and/or order pizza at 6'ish'''&lt;br /&gt;
&lt;br /&gt;
Speaker:  tbd&lt;br /&gt;
&lt;br /&gt;
=== Logistics ===&lt;br /&gt;
Please bring a wifi equipped laptop.  We recommend the [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP LiveCD].  Go ahead and download it and familiarize yourself with it ahead of time, if you're so inclined.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Following the meeting we will have informal discussions over beverages at the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Gordon+Biersch+Brewery+Broomfield+colorado&amp;amp;ie=UTF8&amp;amp;ll=39.935803,-105.13092&amp;amp;spn=0.077395,0.144711&amp;amp;z=13&amp;amp;iwloc=A Gordon Biersch Brewery and Restaurant].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
== Boulder OWASP 2009 AGENDA ==&lt;br /&gt;
=== May 21, 2009 Cross site scripting Lab ===&lt;br /&gt;
Lab to explain how to attack vulnerable sites –we will use three different examples and &lt;br /&gt;
Spend  one half hour on each:  Basic attacks, intermediate and advanced.&lt;br /&gt;
Teacher TBA.&lt;br /&gt;
&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (we’ll choose one):&lt;br /&gt;
&lt;br /&gt;
Black Hat DC researchers demonstrate new cross-site scripting browser hack that lets attackers retrieve data without a trace&lt;br /&gt;
&lt;br /&gt;
[http://developers.slashdot.org/article.pl?sid=09/05/09/1339213 Should Developers Be Liable For Their Code?]&lt;br /&gt;
&lt;br /&gt;
=== June 18, 2009 Part 2 Cross Site Scripting Lab – put it into practice – how to defend against Cross site scripting ===&lt;br /&gt;
We will defend against a basic attack, an intermediate and advanced.&lt;br /&gt;
Teacher TBA&lt;br /&gt;
Remember to bring your OWASP Live CD and your laptop with CD player.&lt;br /&gt;
Location will be at CSU in Fort Collins.  Directions will be forthcoming.&lt;br /&gt;
6:30 to 7pm Dinner (Brown Bag or we will all order pizza) Lab from 7pm to 9pm.&lt;br /&gt;
&lt;br /&gt;
=== No meetings July or August 2009 ===  &lt;br /&gt;
We will try to put up the sites that we are defending against in the June Lab so that you can have a go at them over the break.&lt;br /&gt;
&lt;br /&gt;
=== September 17, 2009 Sql injection ===&lt;br /&gt;
We will be using SQL injection to attack using  authentication bypass, database enumeration, adding users through sql injection, Data mining, writing code &lt;br /&gt;
Teacher TBA&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (TBA).&lt;br /&gt;
&lt;br /&gt;
=== October, 22, 2009 Defense against sql injection – how to sanitize user input ===&lt;br /&gt;
Teacher TBA&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (TBA).&lt;br /&gt;
&lt;br /&gt;
=== November, 19, 2009 This Lab will put into action the SQL injection attack and the defense.  ===&lt;br /&gt;
We will be using the attacks from the September meeting and then defending against them.&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (TBA).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== December  - Date TBA  “Capture the Holiday flag” ===&lt;br /&gt;
We are planning on reserving space at a restaurant.  What better way to Capture the Flag than over a couple of beers?&lt;/div&gt;</summary>
		<author><name>Ariesel</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boulder&amp;diff=64841</id>
		<title>Boulder</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boulder&amp;diff=64841"/>
				<updated>2009-06-24T19:18:52Z</updated>
		
		<summary type="html">&lt;p&gt;Ariesel: /* Next Meeting - XSS Lab - Thurs, May 21st, 6 PM, Staples */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boulder|extra=The chapter leaders are [mailto:kthaxton@businesspartnersolutions.com Kathy Thaxton], [mailto:mrhits777@gmail.com Jeremy Martinez], and [mailto:Andrew.Riesel@GMail.com Andrew Riesel]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-boulder|emailarchives=http://lists.owasp.org/pipermail/owasp-boulder}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boulder&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Next Meeting - XSS Lab - Postponed until August 20th, 2009''' ==&lt;br /&gt;
Please join the Boulder OWASP Chapter on Thursday, August 20th, 2009 at Staples for a XSS lab.  &lt;br /&gt;
&lt;br /&gt;
Due to some location security issues we must postpone the June meeting until August.  We will finish the Cross Site Scripting lab on August 20th, 2009 and we will be using a Broomfield location rather that a Fort Collins location.&lt;br /&gt;
&lt;br /&gt;
The good news is we have some new sites to attack and defend with the help of Anurag Agarwal, the Director of Education at WhiteHat Security and we will have a much more intense lab.&lt;br /&gt;
&lt;br /&gt;
We wholeheartedly apologize for the delay but it will be worth the wait.  &lt;br /&gt;
&lt;br /&gt;
THREE levels of labs - beginner, intermediate, and advanced.&lt;br /&gt;
&lt;br /&gt;
=== Cross-site scripting '''LAB''' - Beginner, Intermediate, and Advanced ===&lt;br /&gt;
&lt;br /&gt;
Lab to explain how to attack vulnerable sites –we will use three different examples and &lt;br /&gt;
Spend  one half hour on each:  Basic attacks, intermediate and advanced.&lt;br /&gt;
Teacher TBA.&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at '''Staples:  [http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&amp;amp;sa=X&amp;amp;oi=map&amp;amp;ct=title One Environmental Way, Broomfield, Co. 80021]'''&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (we’ll choose one)&lt;br /&gt;
&lt;br /&gt;
Black Hat DC researchers demonstrate new cross-site scripting browser hack that lets attackers retrieve data without a trace&lt;br /&gt;
[http://developers.slashdot.org/article.pl?sid=09/05/09/1339213 Should Developers Be Liable For Their Code?]&lt;br /&gt;
&lt;br /&gt;
==== Resources from the Meeting - Stuff you Wish You'd Been There to Hear About :-) ====&lt;br /&gt;
[http://ha.ckers.org/xss.html RSnake's XSS Cheat-sheet]&lt;br /&gt;
&lt;br /&gt;
=== Directions to Staples: ===&lt;br /&gt;
&lt;br /&gt;
'''Staples:  [http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&amp;amp;sa=X&amp;amp;oi=map&amp;amp;ct=title One Environmental Way, Broomfield, Co. 80021]'''&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6 to 7:00 Dinner @ [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Corporate+Express+1+Environmental+Way,+Broomfield+colorado&amp;amp;sll=39.935803,-105.13092&amp;amp;sspn=0.077395,0.144711&amp;amp;ie=UTF8&amp;amp;ll=39.926934,-105.126565&amp;amp;spn=0.009676,0.018089&amp;amp;z=16&amp;amp;iwloc=A Staples CE - Broomfield] &lt;br /&gt;
&lt;br /&gt;
* 7pm to 8:30 pm Cross-site scripting lab&lt;br /&gt;
Sponsor:  '''Nope, no sponsor.  It'a your chapter, BYO dinner and/or order pizza at 6'ish'''&lt;br /&gt;
&lt;br /&gt;
Speaker:  tbd&lt;br /&gt;
&lt;br /&gt;
=== Logistics ===&lt;br /&gt;
Please bring a wifi equipped laptop.  We recommend the [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP LiveCD].  Go ahead and download it and familiarize yourself with it ahead of time, if you're so inclined.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Following the meeting we will have informal discussions over beverages at the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Gordon+Biersch+Brewery+Broomfield+colorado&amp;amp;ie=UTF8&amp;amp;ll=39.935803,-105.13092&amp;amp;spn=0.077395,0.144711&amp;amp;z=13&amp;amp;iwloc=A Gordon Biersch Brewery and Restaurant].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
== Boulder OWASP 2009 AGENDA ==&lt;br /&gt;
=== May 21, 2009 Cross site scripting Lab ===&lt;br /&gt;
Lab to explain how to attack vulnerable sites –we will use three different examples and &lt;br /&gt;
Spend  one half hour on each:  Basic attacks, intermediate and advanced.&lt;br /&gt;
Teacher TBA.&lt;br /&gt;
&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (we’ll choose one):&lt;br /&gt;
&lt;br /&gt;
Black Hat DC researchers demonstrate new cross-site scripting browser hack that lets attackers retrieve data without a trace&lt;br /&gt;
&lt;br /&gt;
[http://developers.slashdot.org/article.pl?sid=09/05/09/1339213 Should Developers Be Liable For Their Code?]&lt;br /&gt;
&lt;br /&gt;
=== June 18, 2009 Part 2 Cross Site Scripting Lab – put it into practice – how to defend against Cross site scripting ===&lt;br /&gt;
We will defend against a basic attack, an intermediate and advanced.&lt;br /&gt;
Teacher TBA&lt;br /&gt;
Remember to bring your OWASP Live CD and your laptop with CD player.&lt;br /&gt;
Location will be at CSU in Fort Collins.  Directions will be forthcoming.&lt;br /&gt;
6:30 to 7pm Dinner (Brown Bag or we will all order pizza) Lab from 7pm to 9pm.&lt;br /&gt;
&lt;br /&gt;
=== No meetings July or August 2009 ===  &lt;br /&gt;
We will try to put up the sites that we are defending against in the June Lab so that you can have a go at them over the break.&lt;br /&gt;
&lt;br /&gt;
=== September 17, 2009 Sql injection ===&lt;br /&gt;
We will be using SQL injection to attack using  authentication bypass, database enumeration, adding users through sql injection, Data mining, writing code &lt;br /&gt;
Teacher TBA&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (TBA).&lt;br /&gt;
&lt;br /&gt;
=== October, 22, 2009 Defense against sql injection – how to sanitize user input ===&lt;br /&gt;
Teacher TBA&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (TBA).&lt;br /&gt;
&lt;br /&gt;
=== November, 19, 2009 This Lab will put into action the SQL injection attack and the defense.  ===&lt;br /&gt;
We will be using the attacks from the September meeting and then defending against them.&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (TBA).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== December  - Date TBA  “Capture the Holiday flag” ===&lt;br /&gt;
We are planning on reserving space at a restaurant.  What better way to Capture the Flag than over a couple of beers?&lt;/div&gt;</summary>
		<author><name>Ariesel</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boulder&amp;diff=61047</id>
		<title>Boulder</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boulder&amp;diff=61047"/>
				<updated>2009-05-20T14:53:36Z</updated>
		
		<summary type="html">&lt;p&gt;Ariesel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Boulder|extra=The chapter leaders are [mailto:kthaxton@businesspartnersolutions.com Kathy Thaxton], [mailto:mrhits777@gmail.com Jeremy Martinez], and [mailto:Andrew.Riesel@GMail.com Andrew Riesel]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-boulder|emailarchives=http://lists.owasp.org/pipermail/owasp-boulder}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Boulder&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Next Meeting - XSS Lab - Thurs, May 21st, 6 PM, Staples''' ==&lt;br /&gt;
Please join the Boulder OWASP Chapter on Thursday, May 21st, 2009 at Staples for a XSS lab.  &lt;br /&gt;
&lt;br /&gt;
THREE levels of labs - beginner, intermediate, and advanced.&lt;br /&gt;
&lt;br /&gt;
=== Cross-site scripting '''LAB''' - Beginner, Intermediate, and Advanced ===&lt;br /&gt;
&lt;br /&gt;
Lab to explain how to attack vulnerable sites –we will use three different examples and &lt;br /&gt;
Spend  one half hour on each:  Basic attacks, intermediate and advanced.&lt;br /&gt;
Teacher TBA.&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at '''Staples:  [http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&amp;amp;sa=X&amp;amp;oi=map&amp;amp;ct=title One Environmental Way, Broomfield, Co. 80021]'''&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (we’ll choose one)&lt;br /&gt;
&lt;br /&gt;
Black Hat DC researchers demonstrate new cross-site scripting browser hack that lets attackers retrieve data without a trace&lt;br /&gt;
[http://developers.slashdot.org/article.pl?sid=09/05/09/1339213 Should Developers Be Liable For Their Code?]&lt;br /&gt;
&lt;br /&gt;
=== Directions to Staples: ===&lt;br /&gt;
&lt;br /&gt;
'''Staples:  [http://maps.google.com/maps?q=1+Environmental+Way,+Broomfield,+CO+80021,+USA&amp;amp;sa=X&amp;amp;oi=map&amp;amp;ct=title One Environmental Way, Broomfield, Co. 80021]'''&lt;br /&gt;
&lt;br /&gt;
=== Agenda ===&lt;br /&gt;
* 6 to 7:00 Dinner @ [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Corporate+Express+1+Environmental+Way,+Broomfield+colorado&amp;amp;sll=39.935803,-105.13092&amp;amp;sspn=0.077395,0.144711&amp;amp;ie=UTF8&amp;amp;ll=39.926934,-105.126565&amp;amp;spn=0.009676,0.018089&amp;amp;z=16&amp;amp;iwloc=A Staples CE - Broomfield] &lt;br /&gt;
&lt;br /&gt;
* 7pm to 8:30 pm Cross-site scripting lab&lt;br /&gt;
Sponsor:  '''Nope, no sponsor.  It'a your chapter, BYO dinner and/or order pizza at 6'ish'''&lt;br /&gt;
&lt;br /&gt;
Speaker:  tbd&lt;br /&gt;
&lt;br /&gt;
=== Logistics ===&lt;br /&gt;
Please bring a wifi equipped laptop.  We recommend the [http://www.owasp.org/index.php/Category:OWASP_Live_CD_2008_Project OWASP LiveCD].  Go ahead and download it and familiarize yourself with it ahead of time, if you're so inclined.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Following the meeting we will have informal discussions over beverages at the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=Gordon+Biersch+Brewery+Broomfield+colorado&amp;amp;ie=UTF8&amp;amp;ll=39.935803,-105.13092&amp;amp;spn=0.077395,0.144711&amp;amp;z=13&amp;amp;iwloc=A Gordon Biersch Brewery and Restaurant].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
-----------------------------------------------------------------------&lt;br /&gt;
&lt;br /&gt;
== Boulder OWASP 2009 AGENDA ==&lt;br /&gt;
=== May 21, 2009 Cross site scripting Lab ===&lt;br /&gt;
Lab to explain how to attack vulnerable sites –we will use three different examples and &lt;br /&gt;
Spend  one half hour on each:  Basic attacks, intermediate and advanced.&lt;br /&gt;
Teacher TBA.&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (we’ll choose one):&lt;br /&gt;
&lt;br /&gt;
Black Hat DC researchers demonstrate new cross-site scripting browser hack that lets attackers retrieve data without a trace&lt;br /&gt;
&lt;br /&gt;
[http://developers.slashdot.org/article.pl?sid=09/05/09/1339213 Should Developers Be Liable For Their Code?]&lt;br /&gt;
&lt;br /&gt;
=== June 18, 2009 Part 2 Cross Site Scripting Lab – put it into practice – how to defend against Cross site scripting ===&lt;br /&gt;
We will defend against a basic attack, an intermediate and advanced.&lt;br /&gt;
Teacher TBA&lt;br /&gt;
Remember to bring your OWASP Live CD and your laptop with CD player.&lt;br /&gt;
Location will be at CSU in Fort Collins.  Directions will be forthcoming.&lt;br /&gt;
6:30 to 7pm Dinner (Brown Bag or we will all order pizza) Lab from 7pm to 9pm.&lt;br /&gt;
&lt;br /&gt;
=== No meetings July or August 2009 ===  &lt;br /&gt;
We will try to put up the sites that we are defending against in the June Lab so that you can have a go at them over the break.&lt;br /&gt;
&lt;br /&gt;
=== September 17, 2009 Sql injection ===&lt;br /&gt;
We will be using SQL injection to attack using  authentication bypass, database enumeration, adding users through sql injection, Data mining, writing code &lt;br /&gt;
Teacher TBA&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (TBA).&lt;br /&gt;
&lt;br /&gt;
=== October, 22, 2009 Defense against sql injection – how to sanitize user input ===&lt;br /&gt;
Teacher TBA&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (TBA).&lt;br /&gt;
&lt;br /&gt;
=== November, 19, 2009 This Lab will put into action the SQL injection attack and the defense.  ===&lt;br /&gt;
We will be using the attacks from the September meeting and then defending against them.&lt;br /&gt;
We will be using the OWASP Live CD and will have them available.&lt;br /&gt;
Must have laptop with CD player.  &lt;br /&gt;
Meeting will be at Staples:  One Environmental Way, Broomfield, Co. 80021&lt;br /&gt;
Brown bag or we can order pizza when everyone gets there.&lt;br /&gt;
6pm to 7pm dinner and Lab from 7pm to 8:30 &lt;br /&gt;
Drinks at Gordon Biersch after the lab.  Topics up for discussion (TBA).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== December  - Date TBA  “Capture the Holiday flag” ===&lt;br /&gt;
We are planning on reserving space at a restaurant.  What better way to Capture the Flag than over a couple of beers?&lt;br /&gt;
&lt;br /&gt;
[[Category:Colorado]]&lt;/div&gt;</summary>
		<author><name>Ariesel</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boulder_OWASP_Lab&amp;diff=51327</id>
		<title>Boulder OWASP Lab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boulder_OWASP_Lab&amp;diff=51327"/>
				<updated>2009-01-15T23:27:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ariesel: /* Desired Lab Components */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== NEWS! ==&lt;br /&gt;
=== Sept 25th 2008 - NYC CTF may get packaged up ===&lt;br /&gt;
&lt;br /&gt;
There is a Capture-The-Flag (CTF) environment at the [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference NYC OWASP Con].  It seems likely that it will be packaged up and distributed.  Stay tuned...&lt;br /&gt;
&lt;br /&gt;
== Link to the Lab Setup Diagrams Andrew found ==&lt;br /&gt;
&lt;br /&gt;
[http://infosecond.wikispaces.com/Lab+Setup+-+Diagram?f=print Diagrams] Andrew shared at the 9/18/2008 bOWASP meeting&lt;br /&gt;
&lt;br /&gt;
== Desired Lab Components ==&lt;br /&gt;
&lt;br /&gt;
 - WLAN WAP and/or big copper switches&lt;br /&gt;
 - host box with loads o' storage capable of running multiple victim VMs; capable of burning VMs to DVD&lt;br /&gt;
 - Proposal: I can provide a machine at the meetings that should work for what we are doing. It has a DVD burner, around a TB in storage space, and is fairly quick.&lt;br /&gt;
             I also have a Linksys wireless router that can be used. I am trying to get my hands on a large switch from our surplus, but haven't had any luck yet.&lt;br /&gt;
             I would be happy to bring it, just let me know.&lt;br /&gt;
             Andrew Riesel&lt;br /&gt;
&lt;br /&gt;
 - Web App Firewall&lt;br /&gt;
 - IPS&lt;br /&gt;
 - CD/DVD copying capability&lt;br /&gt;
&lt;br /&gt;
 - 2-factor auth for any management components; possibly for some of the target apps too...&lt;br /&gt;
 - Hamachi or some sort of VPN so we can stay decentralized...?&lt;br /&gt;
 - Somebody's open-source SEM/SIM to gather events so that the only time WAF/IPS/HIDS/HIPS/Whatever needs to be touched is for config changes&lt;br /&gt;
 - [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference NYC OWASP Con's] CTF environment with all of the above&lt;/div&gt;</summary>
		<author><name>Ariesel</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boulder_OWASP_Lab&amp;diff=50975</id>
		<title>Boulder OWASP Lab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boulder_OWASP_Lab&amp;diff=50975"/>
				<updated>2009-01-12T23:41:22Z</updated>
		
		<summary type="html">&lt;p&gt;Ariesel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== NEWS! ==&lt;br /&gt;
=== Sept 25th 2008 - NYC CTF may get packaged up ===&lt;br /&gt;
&lt;br /&gt;
There is a Capture-The-Flag (CTF) environment at the [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference NYC OWASP Con].  It seems likely that it will be packaged up and distributed.  Stay tuned...&lt;br /&gt;
&lt;br /&gt;
== Link to the Lab Setup Diagrams Andrew found ==&lt;br /&gt;
&lt;br /&gt;
[http://infosecond.wikispaces.com/Lab+Setup+-+Diagram?f=print Diagrams] Andrew shared at the 9/18/2008 bOWASP meeting&lt;br /&gt;
&lt;br /&gt;
== Desired Lab Components ==&lt;br /&gt;
&lt;br /&gt;
 - WLAN WAP and/or big copper switches&lt;br /&gt;
 - host box with loads o' storage capable of running multiple victim VMs; capable of burning VMs to DVD&lt;br /&gt;
 - Proposal: I would like to purchase a machine capable of the above &amp;quot;host box&amp;quot; specs and use it at the BOWASP meetings.&lt;br /&gt;
   The only thing would be that this would remain my personal property. Below are the specs that I was thinking of, please&lt;br /&gt;
   adjust if you wish and send me an email with the change.&lt;br /&gt;
    &lt;br /&gt;
    - Antec Nine Hundred Black Steel ATX Mid Tower Computer Case&lt;br /&gt;
    - ASUS M3A78-T AM2+/AM2 AMD 790GX HDMI ATX AMD Motherboard&lt;br /&gt;
    - OCZ GameXStream OCZ700GXSSLI 700W ATX12V SLI Certified CrossFire Ready Active PFC Power Supply&lt;br /&gt;
    - AMD Phenom 9950 BLACK EDITION Agena 2.6GHz Socket AM2+ 140W Quad-Core Processor Model HD995ZFAGHBOX&lt;br /&gt;
    - 2x OCZ Reaper HPC 4GB (2 x 2GB) 240-Pin DDR2 SDRAM DDR2 1066 (PC2 8500) Dual Channel Kit Desktop Memory (8GB total)&lt;br /&gt;
    - Western Digital Raptor WD740ADFD 74GB 10000 RPM SATA 1.5Gb/s Hard Drive&lt;br /&gt;
    - 2x Seagate Barracuda 7200.11 ST31000333AS 1TB 7200 RPM SATA 3.0Gb/s Hard Drive&lt;br /&gt;
    - LG 22X DVD±R DVD Burner Black SATA Model GH22NS30&lt;br /&gt;
   I will most likely run Ubuntu 64 on it and VMWare Server so that we can mess with different VMs.&lt;br /&gt;
   Let me know what you think. Andrew&lt;br /&gt;
&lt;br /&gt;
 - Web App Firewall&lt;br /&gt;
 - IPS&lt;br /&gt;
 - CD/DVD copying capability&lt;br /&gt;
&lt;br /&gt;
 - 2-factor auth for any management components; possibly for some of the target apps too...&lt;br /&gt;
 - Hamachi or some sort of VPN so we can stay decentralized...?&lt;br /&gt;
 - Somebody's open-source SEM/SIM to gather events so that the only time WAF/IPS/HIDS/HIPS/Whatever needs to be touched is for config changes&lt;br /&gt;
 - [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference NYC OWASP Con's] CTF environment with all of the above&lt;/div&gt;</summary>
		<author><name>Ariesel</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Boulder_OWASP_Lab&amp;diff=50974</id>
		<title>Boulder OWASP Lab</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Boulder_OWASP_Lab&amp;diff=50974"/>
				<updated>2009-01-12T23:40:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ariesel: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== NEWS! ==&lt;br /&gt;
=== Sept 25th 2008 - NYC CTF may get packaged up ===&lt;br /&gt;
&lt;br /&gt;
There is a Capture-The-Flag (CTF) environment at the [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference NYC OWASP Con].  It seems likely that it will be packaged up and distributed.  Stay tuned...&lt;br /&gt;
&lt;br /&gt;
== Link to the Lab Setup Diagrams Andrew found ==&lt;br /&gt;
&lt;br /&gt;
[http://infosecond.wikispaces.com/Lab+Setup+-+Diagram?f=print Diagrams] Andrew shared at the 9/18/2008 bOWASP meeting&lt;br /&gt;
&lt;br /&gt;
== Desired Lab Components ==&lt;br /&gt;
&lt;br /&gt;
 - WLAN WAP and/or big copper switches&lt;br /&gt;
 - host box with loads o' storage capable of running multiple victim VMs; capable of burning VMs to DVD&lt;br /&gt;
 - Proposal: I would like to purchase a machine capable of the above &amp;quot;host box&amp;quot; specs and use it at the BOWASP meetings.&lt;br /&gt;
   The only thing would be that this would remain my personal property. Below are the specs that I was thinking of, please&lt;br /&gt;
   adjust if you wish and send me an email with the change.&lt;br /&gt;
    &lt;br /&gt;
    - Antec Nine Hundred Black Steel ATX Mid Tower Computer Case&lt;br /&gt;
    - ASUS M3A78-T AM2+/AM2 AMD 790GX HDMI ATX AMD Motherboard&lt;br /&gt;
    - OCZ GameXStream OCZ700GXSSLI 700W ATX12V SLI Certified CrossFire Ready Active PFC Power Supply&lt;br /&gt;
    - AMD Phenom 9950 BLACK EDITION Agena 2.6GHz Socket AM2+ 140W Quad-Core Processor Model HD995ZFAGHBOX&lt;br /&gt;
    - 2x OCZ Reaper HPC 4GB (2 x 2GB) 240-Pin DDR2 SDRAM DDR2 1066 (PC2 8500) Dual Channel Kit Desktop Memory (8GB total)&lt;br /&gt;
    - Western Digital Raptor WD740ADFD 74GB 10000 RPM SATA 1.5Gb/s Hard Drive&lt;br /&gt;
    - 2x Seagate Barracuda 7200.11 ST31000333AS 1TB 7200 RPM SATA 3.0Gb/s Hard Drive&lt;br /&gt;
    - LG 22X DVD±R DVD Burner Black SATA Model GH22NS30&lt;br /&gt;
   I will most likely run Ubuntu 64 on it and VMWare Server so that we can mess with different VMs.&lt;br /&gt;
   Let me know what you think. Andrew&lt;br /&gt;
 - Web App Firewall&lt;br /&gt;
 - IPS&lt;br /&gt;
 - CD/DVD copying capability&lt;br /&gt;
&lt;br /&gt;
 - 2-factor auth for any management components; possibly for some of the target apps too...&lt;br /&gt;
 - Hamachi or some sort of VPN so we can stay decentralized...?&lt;br /&gt;
 - Somebody's open-source SEM/SIM to gather events so that the only time WAF/IPS/HIDS/HIPS/Whatever needs to be touched is for config changes&lt;br /&gt;
 - [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference NYC OWASP Con's] CTF environment with all of the above&lt;/div&gt;</summary>
		<author><name>Ariesel</name></author>	</entry>

	</feed>