<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bvankampen</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Bvankampen"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Bvankampen"/>
		<updated>2026-05-16T09:13:00Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Itq_logo.jpg&amp;diff=83338</id>
		<title>File:Itq logo.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Itq_logo.jpg&amp;diff=83338"/>
				<updated>2010-05-11T14:40:03Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=83337</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=83337"/>
				<updated>2010-05-11T14:39:33Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: /* WHERE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
Please block your agendas on Thursday, March 11th, 18h-21:30h for the next Netherlands chapter meeting.&amp;lt;br&amp;gt;Subject will be: Database Security! &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== 2010 Schedule  ==&lt;br /&gt;
&lt;br /&gt;
*March 11th, 18.00 - 21.30 Topic: Database Security&amp;lt;br&amp;gt; &lt;br /&gt;
*May 20th, 18.00 - 21.30 Topic: Web Application Firewalls &lt;br /&gt;
*September 23rd, 18.00 - 21.30 Topic: Security in Content Management Systems &lt;br /&gt;
*November 18th, 18.00 - 21.30 Topic &amp;amp;nbsp;: TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== REGISTRATION  ==&lt;br /&gt;
&lt;br /&gt;
To register for a chapter meeting (first register, first serve)! Please '''send an email''' to: [mailto:netherlands@owasp.org netherlands 'at' owasp.org].&lt;br /&gt;
&lt;br /&gt;
== Next Meeting (May 2010)  ==&lt;br /&gt;
=== WHEN  ===&lt;br /&gt;
May 2010 (18h00pm-21h30pm). &lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &lt;br /&gt;
Location: http://www.setuputrecht.nl/ &amp;lt;br&amp;gt;&lt;br /&gt;
SETUP is gevestigd aan het Neude plein in Utrecht (Neude 4) in het nieuwe kantoor van de Dutch Game Garden.&amp;lt;br&amp;gt;&lt;br /&gt;
(entrance at the back of the ABNamro building on “het Neude”) &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:lokatie_setup_google.gif|200px]] &amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
[[Image:Setup_logo.jpg|200px]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:itq_logo.jpg|200px]] &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM  ===&lt;br /&gt;
&amp;lt;b&amp;gt;18:00 - 18:30 Check-In (catering included)&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;18:30 - 18:45 Introduction (OWASP organization, projects, sponsor)&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;18.45 - 19.45 Web Application Firewalls in dynamic environments&amp;lt;/b&amp;gt;(by Alexander Meisel)&amp;lt;br&amp;gt;&lt;br /&gt;
Alexander Meisel is the CTO of 'art of defence' (AOD), a German based software vendor. The company specializes in high performance deployments of Web Application Firewalls in very dynamic environments all over the world.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
The current trend towards cloud computing forces everybody to deploy services in a virtual environment. In current dedicated environments WAFs or Web Application Firewalls are mostly deployed as a hardware (black) box which is easy at first but limits them to only low performance web cluster architectures. Moving those systems virtualized into a cloud environment makes almost no sense because of the resource limitations.&lt;br /&gt;
The is solution is a redesign which enables WAFs to be part of a true message based cloud system. This talk explains how truly virtualized and distributed web applications are architected, work and scale in high performance environments. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;19.45 – 20.00 Break&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;20.00 - 21:00 Bypassing Web Application Firewalls &amp;lt;/b&amp;gt;(by Sandro Gauci)&amp;lt;br&amp;gt;&lt;br /&gt;
Sandro Gauci is the owner and Founder of EnableSecurity (www.enablesecurity.com) where he performs R&amp;amp;D and securityconsultancy for mid-sized companies. Sandro has over 9 years experience in the security industry and is focused on analysis of security challenges and providing solutions to such threats. Hispassion is vulnerability research and has previously worked together with various endors such as Microsoft and Sun to fix security holes. Sandro is the author of the free VoIP security scanning suite SIPVicious (sipvicious.org) and VOIPPACK for CANVAS.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
WAFs or Web Application Firewalls are being deployed to fix security issues in your web applications. The question is, are they?&lt;br /&gt;
In this presentation we take a look at some of the issues related to making use of this solution and how it may affect the overall security posture of your web application. Finally we will describe tools to automate detection of WAFs, and also tools to help identify ways to bypass WAFs. This presentation will include updates to the open source WAF security testing tools - WAFFIT. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;21.00 – 21:30 Discussion, questions and social networking&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Announcement of this meeting: [[Media:Announcement_OWASP-NL_May_20th_2010.pdf]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Database Security (Mar-11-2010)  ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN  ===&lt;br /&gt;
&lt;br /&gt;
Thurday, March 11th, 2010 (18h00pm-21h30pm). &lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &lt;br /&gt;
ASR Nederland&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; MD0.60 - Auditorium&amp;lt;br&amp;gt; Smallepad 30&amp;lt;br&amp;gt; 3811MG Amersfoort&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
[[Image:ASR Nederland logo.jpg|200px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM  ===&lt;br /&gt;
&amp;lt;b&amp;gt;18:00 - 18:30 Check-In (catering included)&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;18:30 - 18:45 Introduction (OWASP organization, projects, sponsor)&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;18.45 - 19.45 SQL Injection - How far does the rabbit hole go?&amp;lt;/b&amp;gt; (By Justin Clarke)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Justin Clarke&amp;lt;/b&amp;gt;  is a co-founder and Director at Gotham Digital Science, based in the United Kingdom. He has over twelve years of experience in assessing the security of networks, web applications, and wireless networks for large financial, retail, technology and government clients in the United States, the United Kingdom and New Zealand.&lt;br /&gt;
Justin is the the technical editor and lead author of “SQL Injection Attacks and Defense” (Syngress 2009), co-author of &amp;quot;Network Security Tools: Writing, Hacking, and Modifying Security Tools&amp;quot; (O’Reilly 2005), a contributing author to &amp;quot;Network Security Assessment: Know Your Network, 2nd Edition&amp;quot; (O’Reilly 2007), as well as a speaker at a number of conferences and events on security topics, including Black Hat USA, EuSecWest, OSCON, ISACA, RSA, SANS, OWASP, and the British Computer Society. He is the author of the open source SQLBrute blind SQL injection testing tool, and is the Chapter Leader for the London chapter of OWASP.&lt;br /&gt;
SQl Injection - How far does the rabbit hole go? SQL Injection has been around for over 10 years, and yet it is still to this day not truly understood by many security professionals and developers. With the recent mass attacks against sites across the world it has again come to the fore of vulnerabilities under the spotlight, however many consider it to only be a data access issue, or parameterized queries to be a panacea.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk starts from what was demonstrated last year at Black Hat in Las Vegas, where a self propagating SQL Injection worm was demonstrated live on stage. Explore some of the deeper, darker areas of SQL Injection, hybrid attacks, and exploiting obscure database functionality&amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP-SQLInjection5nov09.pdf|the slides in pdf format]])&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;19.45 – 20.00 Break&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;20. 00 – 20.30 VAC Insecure Direct Object Reference&amp;lt;/b&amp;gt; (By Marinus Kuivenhoven)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Marinus Kuivenhoven&amp;lt;/b&amp;gt; is a Senior Technology Specialist with Sogeti Nederland B.V. specializing in service oriented architectures and secure application development. His experience include developing and administrating Oracle-based systems. At Sogeti Nederland B.V. he is also an active member of the PaSS -Software(Proactive Security Strategy) taskforce focusing on secure application development. Marinus also developed and teaches several application security courses both within and outside Sogeti. In the past years he has written for magazine such as Computable and We Love IT. And he has spoken on a number of conferences and events like OWASP, Recent OO Trends, Open Source Developer Conference and Engineering World.&lt;br /&gt;
&amp;lt;b&amp;gt;Vulnerability:&amp;lt;/b&amp;gt; Insecure Direct Object Reference is when a web application exposes an internal implementation object to the user. Some examples of internal implementation objects are database records, URLs, or files.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Attack:&amp;lt;/b&amp;gt; An attacker can modify the internal implementation object in an attempt to abuse the access controls on this object. When the attacker does this they may have the ability to access functionality that the developer didn’t intend to expose access to.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Countermeasure:&amp;lt;/b&amp;gt; Reference should be validated for authorization and accessed through reference maps. How this should be done will be shown.&amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:20100311_VAC-IDOR_Marinus Kuivenhoven.pdf|the slides in pdf format]])&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;20.30 – 21.15 Overlooked Resources and Practices&amp;lt;/b&amp;gt; (By Justin Clarke)&amp;lt;br&amp;gt;&lt;br /&gt;
In his second presentation, Justin Clarke discussed OWASP resources and best practices by highlighting some OWASP projects and underused security practices. He shared his experiences in his daily work as well as the known pitfalls.&amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:20100311_Overlooked_Resources_and _Practices-Justin_Clarke.pdf|the slides in pdf format]])&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;21.15 – 21:30 Discussion, questions and social networking&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Announcement of this meeting: [[Media:Announcement_OWASP-NL_March_11th_2010.pdf]]&amp;lt;br&amp;gt; &lt;br /&gt;
The flyer of this meeting: [[Media:Owasp_NL_march2010.pdf]] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
==== Call for Speakers  ====&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[mailto:bert.koelewijn@owasp.org Bert Koelewijn], ASR &lt;br /&gt;
*[mailto:peter.gouwentak@owasp.org Peter Gouwentak], ING &lt;br /&gt;
*[mailto:martin.knobloch@owasp.org Martin Knobloch], Sogeti &lt;br /&gt;
*[mailto:ferdinand.vroom@owasp.org Ferdinand Vroom], Nationale Nederlanden&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. If you are interested in sponsoring the Netherlands chapter please contact via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;If you would like to donate to our chapter, please use the PayPal link below. Thank you! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt; &lt;br /&gt;
__NOTOC__&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=83336</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=83336"/>
				<updated>2010-05-11T14:37:55Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: /* WHERE */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Local News  ====&lt;br /&gt;
&lt;br /&gt;
Please block your agendas on Thursday, March 11th, 18h-21:30h for the next Netherlands chapter meeting.&amp;lt;br&amp;gt;Subject will be: Database Security! &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== 2010 Schedule  ==&lt;br /&gt;
&lt;br /&gt;
*March 11th, 18.00 - 21.30 Topic: Database Security&amp;lt;br&amp;gt; &lt;br /&gt;
*May 20th, 18.00 - 21.30 Topic: Web Application Firewalls &lt;br /&gt;
*September 23rd, 18.00 - 21.30 Topic: Security in Content Management Systems &lt;br /&gt;
*November 18th, 18.00 - 21.30 Topic &amp;amp;nbsp;: TBD&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== REGISTRATION  ==&lt;br /&gt;
&lt;br /&gt;
To register for a chapter meeting (first register, first serve)! Please '''send an email''' to: [mailto:netherlands@owasp.org netherlands 'at' owasp.org].&lt;br /&gt;
&lt;br /&gt;
== Next Meeting (May 2010)  ==&lt;br /&gt;
=== WHEN  ===&lt;br /&gt;
May 2010 (18h00pm-21h30pm). &lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &lt;br /&gt;
Location: http://www.setuputrecht.nl/ &amp;lt;br&amp;gt;&lt;br /&gt;
SETUP is gevestigd aan het Neude plein in Utrecht (Neude 4) in het nieuwe kantoor van de Dutch Game Garden.&amp;lt;br&amp;gt;&lt;br /&gt;
(entrance at the back of the ABNamro building on “het Neude”) &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:lokatie_setup_google.gif|200px]] &amp;lt;br&amp;gt;&lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
[[Image:Setup_logo.jpg|200px]] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:iqt_logo.jpg|200px]] &lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM  ===&lt;br /&gt;
&amp;lt;b&amp;gt;18:00 - 18:30 Check-In (catering included)&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;18:30 - 18:45 Introduction (OWASP organization, projects, sponsor)&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;18.45 - 19.45 Web Application Firewalls in dynamic environments&amp;lt;/b&amp;gt;(by Alexander Meisel)&amp;lt;br&amp;gt;&lt;br /&gt;
Alexander Meisel is the CTO of 'art of defence' (AOD), a German based software vendor. The company specializes in high performance deployments of Web Application Firewalls in very dynamic environments all over the world.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
The current trend towards cloud computing forces everybody to deploy services in a virtual environment. In current dedicated environments WAFs or Web Application Firewalls are mostly deployed as a hardware (black) box which is easy at first but limits them to only low performance web cluster architectures. Moving those systems virtualized into a cloud environment makes almost no sense because of the resource limitations.&lt;br /&gt;
The is solution is a redesign which enables WAFs to be part of a true message based cloud system. This talk explains how truly virtualized and distributed web applications are architected, work and scale in high performance environments. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;19.45 – 20.00 Break&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;20.00 - 21:00 Bypassing Web Application Firewalls &amp;lt;/b&amp;gt;(by Sandro Gauci)&amp;lt;br&amp;gt;&lt;br /&gt;
Sandro Gauci is the owner and Founder of EnableSecurity (www.enablesecurity.com) where he performs R&amp;amp;D and securityconsultancy for mid-sized companies. Sandro has over 9 years experience in the security industry and is focused on analysis of security challenges and providing solutions to such threats. Hispassion is vulnerability research and has previously worked together with various endors such as Microsoft and Sun to fix security holes. Sandro is the author of the free VoIP security scanning suite SIPVicious (sipvicious.org) and VOIPPACK for CANVAS.&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
WAFs or Web Application Firewalls are being deployed to fix security issues in your web applications. The question is, are they?&lt;br /&gt;
In this presentation we take a look at some of the issues related to making use of this solution and how it may affect the overall security posture of your web application. Finally we will describe tools to automate detection of WAFs, and also tools to help identify ways to bypass WAFs. This presentation will include updates to the open source WAF security testing tools - WAFFIT. &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;21.00 – 21:30 Discussion, questions and social networking&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Announcement of this meeting: [[Media:Announcement_OWASP-NL_May_20th_2010.pdf]]&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Database Security (Mar-11-2010)  ==&lt;br /&gt;
&lt;br /&gt;
=== WHEN  ===&lt;br /&gt;
&lt;br /&gt;
Thurday, March 11th, 2010 (18h00pm-21h30pm). &lt;br /&gt;
&lt;br /&gt;
=== WHERE  ===&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &lt;br /&gt;
ASR Nederland&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; MD0.60 - Auditorium&amp;lt;br&amp;gt; Smallepad 30&amp;lt;br&amp;gt; 3811MG Amersfoort&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
[[Image:ASR Nederland logo.jpg|200px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=== PROGRAM  ===&lt;br /&gt;
&amp;lt;b&amp;gt;18:00 - 18:30 Check-In (catering included)&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;18:30 - 18:45 Introduction (OWASP organization, projects, sponsor)&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;18.45 - 19.45 SQL Injection - How far does the rabbit hole go?&amp;lt;/b&amp;gt; (By Justin Clarke)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Justin Clarke&amp;lt;/b&amp;gt;  is a co-founder and Director at Gotham Digital Science, based in the United Kingdom. He has over twelve years of experience in assessing the security of networks, web applications, and wireless networks for large financial, retail, technology and government clients in the United States, the United Kingdom and New Zealand.&lt;br /&gt;
Justin is the the technical editor and lead author of “SQL Injection Attacks and Defense” (Syngress 2009), co-author of &amp;quot;Network Security Tools: Writing, Hacking, and Modifying Security Tools&amp;quot; (O’Reilly 2005), a contributing author to &amp;quot;Network Security Assessment: Know Your Network, 2nd Edition&amp;quot; (O’Reilly 2007), as well as a speaker at a number of conferences and events on security topics, including Black Hat USA, EuSecWest, OSCON, ISACA, RSA, SANS, OWASP, and the British Computer Society. He is the author of the open source SQLBrute blind SQL injection testing tool, and is the Chapter Leader for the London chapter of OWASP.&lt;br /&gt;
SQl Injection - How far does the rabbit hole go? SQL Injection has been around for over 10 years, and yet it is still to this day not truly understood by many security professionals and developers. With the recent mass attacks against sites across the world it has again come to the fore of vulnerabilities under the spotlight, however many consider it to only be a data access issue, or parameterized queries to be a panacea.&amp;lt;br&amp;gt;&lt;br /&gt;
This talk starts from what was demonstrated last year at Black Hat in Las Vegas, where a self propagating SQL Injection worm was demonstrated live on stage. Explore some of the deeper, darker areas of SQL Injection, hybrid attacks, and exploiting obscure database functionality&amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:OWASP-SQLInjection5nov09.pdf|the slides in pdf format]])&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;19.45 – 20.00 Break&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;20. 00 – 20.30 VAC Insecure Direct Object Reference&amp;lt;/b&amp;gt; (By Marinus Kuivenhoven)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Marinus Kuivenhoven&amp;lt;/b&amp;gt; is a Senior Technology Specialist with Sogeti Nederland B.V. specializing in service oriented architectures and secure application development. His experience include developing and administrating Oracle-based systems. At Sogeti Nederland B.V. he is also an active member of the PaSS -Software(Proactive Security Strategy) taskforce focusing on secure application development. Marinus also developed and teaches several application security courses both within and outside Sogeti. In the past years he has written for magazine such as Computable and We Love IT. And he has spoken on a number of conferences and events like OWASP, Recent OO Trends, Open Source Developer Conference and Engineering World.&lt;br /&gt;
&amp;lt;b&amp;gt;Vulnerability:&amp;lt;/b&amp;gt; Insecure Direct Object Reference is when a web application exposes an internal implementation object to the user. Some examples of internal implementation objects are database records, URLs, or files.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Attack:&amp;lt;/b&amp;gt; An attacker can modify the internal implementation object in an attempt to abuse the access controls on this object. When the attacker does this they may have the ability to access functionality that the developer didn’t intend to expose access to.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Countermeasure:&amp;lt;/b&amp;gt; Reference should be validated for authorization and accessed through reference maps. How this should be done will be shown.&amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:20100311_VAC-IDOR_Marinus Kuivenhoven.pdf|the slides in pdf format]])&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;20.30 – 21.15 Overlooked Resources and Practices&amp;lt;/b&amp;gt; (By Justin Clarke)&amp;lt;br&amp;gt;&lt;br /&gt;
In his second presentation, Justin Clarke discussed OWASP resources and best practices by highlighting some OWASP projects and underused security practices. He shared his experiences in his daily work as well as the known pitfalls.&amp;lt;br&amp;gt;&lt;br /&gt;
([[Media:20100311_Overlooked_Resources_and _Practices-Justin_Clarke.pdf|the slides in pdf format]])&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;21.15 – 21:30 Discussion, questions and social networking&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Announcement of this meeting: [[Media:Announcement_OWASP-NL_March_11th_2010.pdf]]&amp;lt;br&amp;gt; &lt;br /&gt;
The flyer of this meeting: [[Media:Owasp_NL_march2010.pdf]] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2009|2009]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;br /&gt;
&lt;br /&gt;
==== Call for Speakers  ====&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers.&amp;lt;br&amp;gt;'''Presentations:''' Are you working on an interesting subject, would you like to share your experience with the OWASP community and do you have presentation skills. Please let us know! Any topic related to web application security will be appreciated!&amp;lt;br&amp;gt;'''VAC, Vulnerability, Attack, Countermeasure:''' The VAC is a re occuring part of the chapter meetings. The VAC is a half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;span style=&amp;quot;font-weight: bold;&amp;quot;&amp;gt;Links: &amp;lt;/span&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Speaker_Agreement Speaker Agreement] &lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/images/5/54/Presentation_template.ppt Template] &lt;br /&gt;
&lt;br /&gt;
==== Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
The Netherlands Chapter is supported by the following board: &lt;br /&gt;
&lt;br /&gt;
*[mailto:bert.koelewijn@owasp.org Bert Koelewijn], ASR &lt;br /&gt;
*[mailto:peter.gouwentak@owasp.org Peter Gouwentak], ING &lt;br /&gt;
*[mailto:martin.knobloch@owasp.org Martin Knobloch], Sogeti &lt;br /&gt;
*[mailto:ferdinand.vroom@owasp.org Ferdinand Vroom], Nationale Nederlanden&lt;br /&gt;
&lt;br /&gt;
Our goal is to professionalize the local OWASP functioning, provide in a bigger footprint to detect OWASP opportunities such as speakers/topics/sponsors/… and set a 5 year target on: Target audiences, Different events and Interactions of OWASP global – local projects. &lt;br /&gt;
&lt;br /&gt;
==== Chapter Sponsoring  ====&lt;br /&gt;
&lt;br /&gt;
OWASP Netherlands is looking for organizations to sponsor our chapter. If you are interested in sponsoring the Netherlands chapter please contact via email: [mailto:netherlands@owasp.org netherlands 'at' owasp.org]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;If you would like to donate to our chapter, please use the PayPal link below. Thank you! &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt; &lt;br /&gt;
__NOTOC__&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_NL_march2010.pdf&amp;diff=78967</id>
		<title>File:Owasp NL march2010.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_NL_march2010.pdf&amp;diff=78967"/>
				<updated>2010-02-26T07:05:34Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Flyer of the OWASP Netherlands March 2010 meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Flyer of the OWASP Netherlands March 2010 meeting&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=70020</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=70020"/>
				<updated>2009-09-29T09:16:29Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: /* Next OWASP Cafe: */ Reduced size of displaying the flyer&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=The chapter leader is [mailto:owasp@irc2.nl Bert Koelewijn]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers and presentations make the chapter meetings as interesting as possible. Therefore we are looking inside and outside OWASP for known international specialists. But we know, there is a lot interesting stuf happening inside the Netherlands, too! &amp;lt;br&amp;gt; '''Presentations:''' Are you working on interesting subject, you would like to share your experiences with the OWASP community. Any topic related to application security will be appreciated!&amp;lt;br&amp;gt; '''VAC, Vulnerability, Attack, Countermeasure:''' The goal is an half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsorship of a local chapter meeting  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for locations to hold local chapter meetings. Therefore, we need companies willing to sponsor of host events.&amp;lt;br&amp;gt; '''Hosting a local chapter meeting:''' To host a local chapter meeting, you facilitate the meeting location and beverage for the attendees&amp;lt;br&amp;gt; '''Sponsorship of a local chapter meeting:''' You cover the cost of renting the location for the meeting and the payment of the beverages for the attendees&amp;lt;br&amp;gt; '''Please let us know via the OWASP chapter meeting questionnaire of via email to martin.knobloch@owasp.org&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
== '''OWASP NL Cafe'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;'''NEW:'''&amp;lt;/font&amp;gt; Monthly informal platform to speak about (Web) application security matters! No registration required, just drop by! &lt;br /&gt;
&lt;br /&gt;
*no programm &lt;br /&gt;
*no agenda &lt;br /&gt;
*whatever comes up!&lt;br /&gt;
&lt;br /&gt;
=== Next OWASP Cafe:  ===&lt;br /&gt;
Open and free event, just drop in and discuse what's on your mind about application security!&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
When:  Thursday, 8 October, starting from 6pm&lt;br /&gt;
Where: Prof. Dr. Ornsteinlaan 14, 3431 EP Nieuwegein&lt;br /&gt;
...my place again ;-)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
The flyer: [[File:OWASP_NL_Cafe_oct09.jpg|100px]]&lt;br /&gt;
&lt;br /&gt;
== '''OWASP NL Chapter Meetings Schedule 2009'''  ==&lt;br /&gt;
&lt;br /&gt;
This is an overview of the 2009 local chapter meeting schedule. Details of the meetings can be found in the announcements that will be posted below this schedule. &lt;br /&gt;
&amp;lt;pre&amp;gt;April 9th&lt;br /&gt;
----------&lt;br /&gt;
Time        &amp;amp;nbsp;: 18.00 - 21.30&lt;br /&gt;
Main Topic  &amp;amp;nbsp;: Knowing Your Enemy&lt;br /&gt;
Presentations: Modern information gathering; how to abuse search engines         Dave van Stein&lt;br /&gt;
               VAC Cross-site scripting                                          Martin Visser &lt;br /&gt;
               Beveiligingsaspecten van webapplicatie-ontwikkeling               Wouter van Kuipers &lt;br /&gt;
Location    &amp;amp;nbsp;: Lange Dreef 17&lt;br /&gt;
               4131 NJ Vianen&lt;br /&gt;
Sponsor     &amp;amp;nbsp;: Sogeti Nederland B.V.&lt;br /&gt;
&lt;br /&gt;
May 28th&lt;br /&gt;
----------&lt;br /&gt;
Time        &amp;amp;nbsp;: 18.00 - 21.30&lt;br /&gt;
Main Topic  &amp;amp;nbsp;: AppSec Europe 2009&lt;br /&gt;
Presentations: AppSec-EU 2009                                                    Sebastien Deleersnyder, Telindus &lt;br /&gt;
               VAC Cross-Site Request Forgery                                    Niels Teusink&lt;br /&gt;
               Open session / discussion about subjects brought forward by &lt;br /&gt;
               the attendees                                                     Martin Knobloch/Ferdinand Vroom/Peter Gouwentak&lt;br /&gt;
Location    &amp;amp;nbsp;: ASR Nederland&lt;br /&gt;
               MD0.60 - Auditorium&lt;br /&gt;
               Smallepad 30&lt;br /&gt;
               3811MG Amersfoort&lt;br /&gt;
Sponsor     &amp;amp;nbsp;: ASR Nederland&lt;br /&gt;
&lt;br /&gt;
September 24th&lt;br /&gt;
----------&lt;br /&gt;
Time        &amp;amp;nbsp;: 18.00 - 21.30&lt;br /&gt;
Main Topic  &amp;amp;nbsp;: Unauthorised Access&lt;br /&gt;
Presentations: Unauthorised Access                                               Wil Allsopp&lt;br /&gt;
               Mini Meetings report: Time- Box testing &amp;amp;amp; Test Tools              Barry van Kampen/ Dave van Stein&lt;br /&gt;
               Education Project report                                          Martin Knobloch&lt;br /&gt;
               Discussion, questions and social networking&lt;br /&gt;
Location    &amp;amp;nbsp;: Sofitel Cocagne&lt;br /&gt;
               Vestdijk 47&lt;br /&gt;
               5611 CA  Eindhoven&lt;br /&gt;
               Google Maps Route: http://tiny.cc/24kWE&lt;br /&gt;
Sponsor     &amp;amp;nbsp;: Madison Gurkha&lt;br /&gt;
&lt;br /&gt;
December 10th&lt;br /&gt;
----------&lt;br /&gt;
Time        &amp;amp;nbsp;: 17.30 - 21.30&lt;br /&gt;
Main Topic  &amp;amp;nbsp;: &lt;br /&gt;
Presentations: &lt;br /&gt;
Location    &amp;amp;nbsp;: &lt;br /&gt;
Sponsor     &amp;amp;nbsp;: &lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br&amp;gt; If you want to attend, please send an email to: netherlands-board@lists.owasp.org &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; All OWASP chapter meetings are free of charge and you don't have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; NOTE TO CISSP's: OWASP Meetings count towards CPE Credits.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''OWASP NL Mini-Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;'''NEW:'''&amp;lt;/font&amp;gt; Platform to discus on specific issues related to (Web) Application Security. The topic's are brought in by the OWASP NL community!&amp;lt;br&amp;gt; Something on your mind to discus, put your idea online at: Mini Meetings [[Netherlands Mini Meeting 2009|Netherlands_Mini_Meeting_2009]] To attend the meeting, send an email to the contact's email address! &lt;br /&gt;
&lt;br /&gt;
=== Next Mini-Meeting: &amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;CANCELLED&amp;amp;nbsp;!!!&amp;lt;/font&amp;gt;  ===&lt;br /&gt;
&amp;lt;pre&amp;gt;Topic       &amp;amp;nbsp;: Tools of the trade; exchange real-life experiences&lt;br /&gt;
Contact     &amp;amp;nbsp;: Dave van Stein, dvstein+owasp [-at-] gmail [-dot-] com&lt;br /&gt;
----------&lt;br /&gt;
Date        &amp;amp;nbsp;: cancelled&lt;br /&gt;
Time        &amp;amp;nbsp;: &lt;br /&gt;
Location    &amp;amp;nbsp;: &lt;br /&gt;
Details     &amp;amp;nbsp;: Exchange real-world experience about web testing tools. What is really useable and what is not.&lt;br /&gt;
Attendees   &amp;amp;nbsp;: Min 6, max 8, currently 3 attendees &lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
== '''Meeting Minutes'''  ==&lt;br /&gt;
&lt;br /&gt;
=== Meeting minutes May 28th 2009  ===&lt;br /&gt;
&lt;br /&gt;
At May 28th, the Dutch OWASP chapter came together at the ASR building in Amersfoort. The main topic of the evening was AppSec 2009. There were 2 speakers and approximately 20 attendees.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; There was no sponsor talk or general announcement so after a very short welcome talk by Bert the evening started.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''First presentation:''' AppSec 2009 by Sebastien Deleersnyder. &amp;lt;br&amp;gt; The first presentation of the evening was a recap of AppSec 2009 in Poland. The conference was a big success with around 170 attendees. The meeting preceded the 2009 edition of Confidence [http://2009.confidence.org.pl/] resulting in a week of security presentations and workshops. All AppSec presentations and many movies, pictures, and other material can be found on the AppSec wiki [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2009_-_Poland] but a few items are worth mentioning in specific. First of all OWASP is growing and changing. These changes include a simplification of the membership fees, the introduction of a 'code of ethics', and a general review of all 120 projects. Other highlights are the project ASVS, which has reached an international standard status and updated versions of WebGoat and LabRat.&amp;lt;br&amp;gt; Lastly besides a Wiki and a LinkedIn group, OWASP is now also active on Twitter [http://twitter.com/owasp] &amp;amp;amp; [http://twitter.com/owasp_nl] and has two overview pages with all video [http://www.owasp.org/index.php/Category:OWASP_Video] and audio materials [http://www.owasp.org/index.php/OWASP_Podcast].&amp;lt;br&amp;gt; Feel free to use all the materials (as long as you abide by the new code of ethics off course) and visit the OWASP websites frequently for updates&amp;amp;nbsp;!&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Second presentation:''' VAC Cross-Site Request Forgery by Niels Teusink. &amp;lt;br&amp;gt; After succesfull VAC's about SQL injection and Cross-site scripting, the topic of this evening's VAC was Cross-site Request Forgery, also known as CSRF. CSRF is probably one of the least understood vulnerabilities, but can have tremendous consequences when succesfully exploited. In essence it is an attack that misuses the victim's autorisations with malicious scripts. CSRF attacks can also be easily combined with other attack, like e.g. XSS, making them even more dangerous. &amp;lt;br&amp;gt; Despite the name suggests, these attacks do not have to be on different websites (domains). With the continuing trend to combine multiple functionalities in a single application, so-called onsite request forgeries are becoming more and more frequent. Contrary to XSS and SQL injection, CSRF can not be blocked by input validation. In order to prevent these kind of attacks, an application has to able to verify the authenticity of a request. This can be achieved by several methods like using a unique identifier for a session or each request or requiring additional user input like a CAPTCHA or a one-time token. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Open Discussion''' &amp;lt;br&amp;gt; The evening was closed with an open discussion about how to improve knowledge sharing among the OWASP members. Many interesting discussions start during the drinks after the presentations on the OWASP evenings, discussions that sadly often are stopped prematurly due to time restraints.&amp;lt;br&amp;gt; As an addition on the quarterly presentation evenings, the Dutch chapter decided to also start mini-meetings and the OWASP cafe.&amp;lt;br&amp;gt; Mini-meetings will not be planned on beforehand, but instead will be planned when a topic is proposed and enough attendees have stated an interest in the topic. The attendees will have to select a location themselves but can request a donation from the OWASP for drinks and snacks. Topics discussed at the mini-meeting will have to be listed in minutes so other members can also profit from this knowledge exchange.&amp;lt;br&amp;gt; The OWASP cafe will be planned each first thursday of the month on a location that will be listed on the OWASP Dutch chapter site. The rules are simple: the evening starts at a certain time, ends at a certain time and will be filled with drinks, snacks, and nerd/hacker/geek humor and discussions in between.&amp;lt;br&amp;gt; Check the website frequently for the location of the next mini-meeting and OWASP cafe&amp;amp;nbsp;!&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Meeting minutes April 9th 2009  ===&lt;br /&gt;
&lt;br /&gt;
At April 9th, the Dutch OWASP chapter came together at the office of Sogeti in Vianen. The main topic of the evening was &amp;quot;knowing your enemy&amp;quot;. There were 3 speakers and approximately 50 attendees.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; The sponsor of the evening started with a small welcome and an overview of their internal security program named PASS. After some small announcements from the OWASP the evening started.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''First presentation:''' Modern information gathering; how to abuse search engines by Dave van Stein.&amp;lt;br&amp;gt; The first presentation of the evening was about using search engines and crawlers to gain detailed information about webservers and websites. Ill configured webservers allow search engine crawlers to collect much information about a system, information that is stored and can be retrieved with search engines. Many websites and tools make use of this mechanism and, combined with DNS and WHOIS information, are able to provide detailed or sensitive information like usernames, vulnerabilities, present files or network topology about a system without targeting it directly.&amp;lt;br&amp;gt; Restricting crawlers to access a system can act as a first line of defence and reduce exposure and risks.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Second presentation:''' VAC Cross-site scripting by Martin Visser. &amp;lt;br&amp;gt; The second VAC on an OWASP meeting was about Cross-site scripting also known as XSS. XSS vulnerabilities are often misunderstood and underestimated but facts show that XSS vulnerability abusing attacks are nowadys the fastest growing and most widespread type of exploit. In short XSS vulnerabilities allow for user input to be executed when containing javascript or HTML code. When combined with other vulnerabilities the possibilities of these attacks are vitually limitless.&amp;lt;br&amp;gt; The only way to prevent these attacks is to sanitize all input and output fields, but this can be more difficult than it appears to be. Simply blacklisting fragments like &amp;amp;lt;script&amp;amp;gt; is not sufficient due to the possibility of recursivity (e.g. &amp;amp;lt;scr&amp;amp;lt;script&amp;amp;gt;ipt&amp;amp;gt;) and encoding (e.g. URL encoding:&amp;amp;nbsp;%3C%73%63%72%69%70%74%3E). Using multiple layers of filters on various places is the only way to assure enough protection against these types of attacks.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Third presentation:''' Beveiligingsaspecten van webapplicatie-ontwikkeling by Wouter van Kuipers. &amp;lt;br&amp;gt; The third presentation of the evening was about the efficiency of a source code analyer for php based websites. Approximately 33% of all websites use php and this can be explained by the low learning curve and ease of use of the language. Due to the low learning curve many php developers have little experience with programming and almost no awareness regading security resulting in many unsecure websites. Source code analysis can help preventing many security issues, but their usage does have some limitations. Firstly the scan on itself takes only a few minutes, but analysing the results requires much longer and depends greatly on how familiar the analyser is with the scanned source code. Second these analysers produce many flase positives, making analysis even more time consuming. Lastly not all vulnerabilities are detected with the same efficiency. Especially vulnerabilities that are dependent on the application logic like injection or XSS are not always efficiently detected.&amp;lt;br&amp;gt; Concluding, like all tools, a source code analyser can be a powerful tool, but one has to be aware of its limitations. These tools can provide results very fast, but when used on unfamiliar code the analysis can be very time consuming. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Scheduled OWASP NL Chapter Meetings:  ==&lt;br /&gt;
&lt;br /&gt;
=== Meeting Schedule September 24th 2009: Unautorized Access&amp;lt;br&amp;gt;  ===&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;500&amp;quot; align=&amp;quot;left&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Madison Gurkha &lt;br /&gt;
&lt;br /&gt;
Sofitel Cocagne Eindhoven&amp;lt;br&amp;gt;Vestdijk 47&amp;lt;br&amp;gt;5611 CA Eindhoven&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| [[Image:Logo Madison Gurkha.GIF|200px]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''18:00 - 18:30 Check-In (catering included)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''18:30 - 18:45 Introduction (OWASP organization, projects, sponsor)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''18.45 - 19.45 Unauthorized Access (Wil Allsopp)&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
Physical Penetration Testing and Social Engineering have been conducted by testing organisations for some time but there has been very little discussion within the industry regarding the use of formal approaches ensuring a consistently high quality and repeatability of the testing lifecycle. &lt;br /&gt;
&lt;br /&gt;
This was a problem I attempted to address in the book Unauthorized Access and is the focus of this discussion. &lt;br /&gt;
&lt;br /&gt;
We will look at the following: &lt;br /&gt;
&lt;br /&gt;
*What is physical penetration testing and what does it aim to achieve?&amp;lt;br&amp;gt; &lt;br /&gt;
*Tactical approaches to Social Engineering in testing.&amp;lt;br&amp;gt; &lt;br /&gt;
*The advantages and disadvantages of deploying SE.&amp;lt;br&amp;gt; &lt;br /&gt;
*Training operators and building operating teams - what skill sets should you deploy? &amp;lt;br&amp;gt; &lt;br /&gt;
*What are the legal aspects involved, how do these vary between jurisdictions? &amp;lt;br&amp;gt; &lt;br /&gt;
*How should you plan a physical penetration test at strategic, tactical and operational levels? &amp;lt;br&amp;gt; &lt;br /&gt;
*How do you gauge risk i.e. Contractual, Operational, Legal and Environmental?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The biggest problem currently facing physical penetration testing teams is that it's hard to prove a negative i.e. a failed test by no means guarantees the security of the client. By ensuring your team is trained and prepared you can mitigate this problem to a large degree.'''&amp;lt;br&amp;gt;'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''19.45 – 20.00 Break''' &lt;br /&gt;
&lt;br /&gt;
'''20. 00 – 20.30 Mini Meetings: Time- Box testing &amp;amp;amp; Test Tools (Barry van Kampen en Dave van Stein)&lt;br /&gt;
&lt;br /&gt;
'''20.30 – 21.00 Education Project (Martin Knobloch)'''&lt;br /&gt;
&lt;br /&gt;
'''21.00 – 21:30 Discussion, questions and social networking'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Meeting Schedule May 28th 2009: AppSec Europe 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''Summary''' The main goal of the upcoming OWASP-NL meeting is to provide an abstract of the recently held AppSec Europe 2009, a VAC about CSRF and, new, an open discussion on application security subjects brought forward by the attendees. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &lt;br /&gt;
ASR Nederland&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; MD0.60 - Auditorium&amp;lt;br&amp;gt; Smallepad 30&amp;lt;br&amp;gt; 3811MG Amersfoort&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
[[Image:ASR Nederland logo.jpg|200px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''18.45 - 19.45 AppSec-EU 2009 (Sebastien Deleersnyder, Telindus) '''&amp;lt;br&amp;gt; Update on the AppSec-EU 2009: &amp;lt;br&amp;gt; OWASP State of the union, an update on OWASP and OWASP projects and of course the highlights of the AppSec-EU 2009 presentations. &lt;br /&gt;
&lt;br /&gt;
'''19.45 - 20.00 Break '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.30 VAC Cross-Site Request Forgery (Niels Teusink, Fox-IT) ''' ([[Media:20090409_VAC-CSRF-Niels_Teusink.pdf]])&amp;lt;br&amp;gt; CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application. &lt;br /&gt;
&lt;br /&gt;
Niels Teusink holds a bachelor degree in Computer Science and has been experimenting with IT security for over a decade. He has worked for Fox-IT since 2005; first as a software engineer and since 2007 as a penetration tester. He has since performed dozens of penetration tests for all sorts of companies, including governments, banks and nuclear installations. &lt;br /&gt;
&lt;br /&gt;
'''20.30 - 21.15 Open session / discussion (Martin Knobloch/Ferdinand Vroom/Peter Gouwentak) ''' &amp;lt;br&amp;gt; Open session / discussion about subjects brought forward by the attendees. &lt;br /&gt;
&lt;br /&gt;
The Announcement of this meeting: [[Media:Announcement_OWASP-NL_May_28th_2009.pdf]]&amp;lt;br&amp;gt; The flyer of this meeting: [[Media:Owasp_NL_may2009.pdf]] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Meeting Schedule 9th April Knowing Your Enemy  ===&lt;br /&gt;
&lt;br /&gt;
'''Summary''' The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &lt;br /&gt;
Lange Dreef 17&amp;lt;br&amp;gt; 4131 NJ Vianen&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
[[Image:Sogeti Nederland b v Logo.jpg|http:\\www.sogeti.nl]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
About Sogeti Nederland B.V. Sogeti Nederland B.V. is one of top-5 IT companies of the Netherlands. Our workforce of over 3,500 employees provides top quality IT consultancy and services to leading companies in several industry sectors in the Netherlands. Our focus is local, but we are part of Sogeti Worldwide, offering IT services in the American, German, French, Belgian, UK, Swedish, Swiss and Spanish markets. &lt;br /&gt;
&lt;br /&gt;
Our core business is the design, construction, deployment, testing and maintenance of IT solutions. We stand for quality and IT skills; this is visible in our service and in the methods developed by us such as DYA®, Regatta®, TMap®, TPI® , Inframe®, and TEmb. &lt;br /&gt;
&lt;br /&gt;
Vision Sogeti delivers value by aligning the results of her services to the strategic goals of the client, thereby committing herself to the success of the client. We prove our commitment by assuming responsibility in various forms and to various degrees. &lt;br /&gt;
&lt;br /&gt;
New trends Our own research institute ViNT (Institute for Research into New Technology) keeps us and our clients ahead of the newest technology trends and their potential influence, benefits and risks. &amp;lt;br&amp;gt; More information about Sogeti can be found on our website www.sogeti.nl. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt; '''18.45 - 19.30 Modern information gathering; how to abuse search engines Dave van Stein '''([[Media:20090409_passsive_reconnaissance-Dave_van_Stein.pdf]])&amp;lt;br&amp;gt; Great generals already know the key to success is &amp;quot;knowing your enemy&amp;quot;. In hacking terms this is called information gathering, fingerprinting or reconnaissance. Traditionally this phase consisted of using public records like WHOIS and DNS combined with active scans on servers. With the rise of advanced search engines like Yahoo, Live Search and Google a whole new type of reconnaissance has come to life; passive reconnaissance. Often servers are not properly configured which causes lots of valuable information to become available without accessing the server at all. Recently several hacker-tools appeared which use the full capabilities of these search engines giving hackers a head-start at mapping the network they plan to attack. The goal of this session is to give insight in the methods and tools hackers have at their disposal to gather information about systems they plan to attack without accessing the system itself. Dave van Stein has close to 8 years of experience in software testing. Since the beginning of 2008 he's working for ps_testware as a web application security testing specialist. &lt;br /&gt;
&lt;br /&gt;
'''19.30 - 20.00 VAC Cross-site scripting Martin Visser '''([[Media:20090409_VAC_Cross-site-scripting_Martin_Visser.pdf]])&amp;lt;br&amp;gt; Martin Visser is a software designer with Sogeti Nederland B.V. specialized in secure application development with Microsoft technologies. He has experience with Microsoft server technologies like ASP.NET, SharePoint and Biztalk. Martin also developed and teaches a 2-day &amp;quot;Application Security - Microsoft development&amp;quot; course both within and outside Sogeti. &lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.15 Break ''' &amp;lt;br&amp;gt; '''20.15 - 21.00 Beveiligingsaspecten van webapplicatie-ontwikkeling Wouter van Kuipers ''' ([[Media:20090409_presentatie_Wouter_van_Kuipers.pdf]])&amp;lt;br&amp;gt; Het ontwikkelen van webapplicaties verschilt op verschillende aspecten met het ontwikkelen van desktop applicaties, met name op het gebied van security. Voor grote bedrijven zijn er oplossingen beschikbaar als bijvoorbeeld SDL, maar voor het midden- en kleinbedrijf zijn dit soort oplossingen beperkt, omdat zij vaak niet de middelen hebben om dergelijke strategieën uit te kunnen voeren. Voor zijn scriptie heeft Wouter van Kuipers middels een literatuuronderzoek, interviews met ontwikkelaars en een onderzoek naar Fortify 360 gekeken hoe het midden- en kleinbedrijf omgaat met deze verschillen en hoe zij het ontwikkelproces kunnen optimaliseren op het gebied van security. &lt;br /&gt;
&lt;br /&gt;
Na een MBO opleiding in de IT is Wouter van Kuipers via de HBO opleiding 'Communicatie Systemen' begin 2007 begonnen met een master Informatiekunde aan de Radboud Universiteit Nijmegen, welke hij in maart dit jaar hoopt af te ronden. Tijdens zijn MBO studie is zijn interesse in het ontwikkelen van webapplicaties gewekt, wat in 2003 resulteerde in het opzetten van een eigen web-development bedrijf. Dit bedrijf is met name gespecialiseerd in het ontwikkelen van webapplicaties op maat, en het ondersteunen van bedrijven op het gebied van web-developement op freelance basis. &lt;br /&gt;
&lt;br /&gt;
The flyer of this meeting: [[Media:Owasp_NL_april2009.pdf]] &lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_NL_Cafe_oct09.jpg&amp;diff=70019</id>
		<title>File:OWASP NL Cafe oct09.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_NL_Cafe_oct09.jpg&amp;diff=70019"/>
				<updated>2009-09-29T09:15:11Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Flyer OWASP NL Cafe October 2009&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Flyer OWASP NL Cafe October 2009&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=70018</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=70018"/>
				<updated>2009-09-29T09:13:54Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: /* Next OWASP Cafe: */ Added OWASP NL Cafe flyer october 2009&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=The chapter leader is [mailto:owasp@irc2.nl Bert Koelewijn]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}} &lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for speakers and presentations make the chapter meetings as interesting as possible. Therefore we are looking inside and outside OWASP for known international specialists. But we know, there is a lot interesting stuf happening inside the Netherlands, too! &amp;lt;br&amp;gt; '''Presentations:''' Are you working on interesting subject, you would like to share your experiences with the OWASP community. Any topic related to application security will be appreciated!&amp;lt;br&amp;gt; '''VAC, Vulnerability, Attack, Countermeasure:''' The goal is an half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Sponsorship of a local chapter meeting  ===&lt;br /&gt;
&lt;br /&gt;
We are continuously looking for locations to hold local chapter meetings. Therefore, we need companies willing to sponsor of host events.&amp;lt;br&amp;gt; '''Hosting a local chapter meeting:''' To host a local chapter meeting, you facilitate the meeting location and beverage for the attendees&amp;lt;br&amp;gt; '''Sponsorship of a local chapter meeting:''' You cover the cost of renting the location for the meeting and the payment of the beverages for the attendees&amp;lt;br&amp;gt; '''Please let us know via the OWASP chapter meeting questionnaire of via email to martin.knobloch@owasp.org&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
== '''OWASP NL Cafe'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;'''NEW:'''&amp;lt;/font&amp;gt; Monthly informal platform to speak about (Web) application security matters! No registration required, just drop by! &lt;br /&gt;
&lt;br /&gt;
*no programm &lt;br /&gt;
*no agenda &lt;br /&gt;
*whatever comes up!&lt;br /&gt;
&lt;br /&gt;
=== Next OWASP Cafe:  ===&lt;br /&gt;
Open and free event, just drop in and discuse what's on your mind about application security!&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
When:  Thursday, 8 October, starting from 6pm&lt;br /&gt;
Where: Prof. Dr. Ornsteinlaan 14, 3431 EP Nieuwegein&lt;br /&gt;
...my place again ;-)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
[[File:OWASP_NL_Cafe_oct09.jpg]]&lt;br /&gt;
&lt;br /&gt;
== '''OWASP NL Chapter Meetings Schedule 2009'''  ==&lt;br /&gt;
&lt;br /&gt;
This is an overview of the 2009 local chapter meeting schedule. Details of the meetings can be found in the announcements that will be posted below this schedule. &lt;br /&gt;
&amp;lt;pre&amp;gt;April 9th&lt;br /&gt;
----------&lt;br /&gt;
Time        &amp;amp;nbsp;: 18.00 - 21.30&lt;br /&gt;
Main Topic  &amp;amp;nbsp;: Knowing Your Enemy&lt;br /&gt;
Presentations: Modern information gathering; how to abuse search engines         Dave van Stein&lt;br /&gt;
               VAC Cross-site scripting                                          Martin Visser &lt;br /&gt;
               Beveiligingsaspecten van webapplicatie-ontwikkeling               Wouter van Kuipers &lt;br /&gt;
Location    &amp;amp;nbsp;: Lange Dreef 17&lt;br /&gt;
               4131 NJ Vianen&lt;br /&gt;
Sponsor     &amp;amp;nbsp;: Sogeti Nederland B.V.&lt;br /&gt;
&lt;br /&gt;
May 28th&lt;br /&gt;
----------&lt;br /&gt;
Time        &amp;amp;nbsp;: 18.00 - 21.30&lt;br /&gt;
Main Topic  &amp;amp;nbsp;: AppSec Europe 2009&lt;br /&gt;
Presentations: AppSec-EU 2009                                                    Sebastien Deleersnyder, Telindus &lt;br /&gt;
               VAC Cross-Site Request Forgery                                    Niels Teusink&lt;br /&gt;
               Open session / discussion about subjects brought forward by &lt;br /&gt;
               the attendees                                                     Martin Knobloch/Ferdinand Vroom/Peter Gouwentak&lt;br /&gt;
Location    &amp;amp;nbsp;: ASR Nederland&lt;br /&gt;
               MD0.60 - Auditorium&lt;br /&gt;
               Smallepad 30&lt;br /&gt;
               3811MG Amersfoort&lt;br /&gt;
Sponsor     &amp;amp;nbsp;: ASR Nederland&lt;br /&gt;
&lt;br /&gt;
September 24th&lt;br /&gt;
----------&lt;br /&gt;
Time        &amp;amp;nbsp;: 18.00 - 21.30&lt;br /&gt;
Main Topic  &amp;amp;nbsp;: Unauthorised Access&lt;br /&gt;
Presentations: Unauthorised Access                                               Wil Allsopp&lt;br /&gt;
               Mini Meetings report: Time- Box testing &amp;amp;amp; Test Tools              Barry van Kampen/ Dave van Stein&lt;br /&gt;
               Education Project report                                          Martin Knobloch&lt;br /&gt;
               Discussion, questions and social networking&lt;br /&gt;
Location    &amp;amp;nbsp;: Sofitel Cocagne&lt;br /&gt;
               Vestdijk 47&lt;br /&gt;
               5611 CA  Eindhoven&lt;br /&gt;
               Google Maps Route: http://tiny.cc/24kWE&lt;br /&gt;
Sponsor     &amp;amp;nbsp;: Madison Gurkha&lt;br /&gt;
&lt;br /&gt;
December 10th&lt;br /&gt;
----------&lt;br /&gt;
Time        &amp;amp;nbsp;: 17.30 - 21.30&lt;br /&gt;
Main Topic  &amp;amp;nbsp;: &lt;br /&gt;
Presentations: &lt;br /&gt;
Location    &amp;amp;nbsp;: &lt;br /&gt;
Sponsor     &amp;amp;nbsp;: &lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br&amp;gt; If you want to attend, please send an email to: netherlands-board@lists.owasp.org &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; All OWASP chapter meetings are free of charge and you don't have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; NOTE TO CISSP's: OWASP Meetings count towards CPE Credits.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== '''OWASP NL Mini-Meetings'''  ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;'''NEW:'''&amp;lt;/font&amp;gt; Platform to discus on specific issues related to (Web) Application Security. The topic's are brought in by the OWASP NL community!&amp;lt;br&amp;gt; Something on your mind to discus, put your idea online at: Mini Meetings [[Netherlands Mini Meeting 2009|Netherlands_Mini_Meeting_2009]] To attend the meeting, send an email to the contact's email address! &lt;br /&gt;
&lt;br /&gt;
=== Next Mini-Meeting: &amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;CANCELLED&amp;amp;nbsp;!!!&amp;lt;/font&amp;gt;  ===&lt;br /&gt;
&amp;lt;pre&amp;gt;Topic       &amp;amp;nbsp;: Tools of the trade; exchange real-life experiences&lt;br /&gt;
Contact     &amp;amp;nbsp;: Dave van Stein, dvstein+owasp [-at-] gmail [-dot-] com&lt;br /&gt;
----------&lt;br /&gt;
Date        &amp;amp;nbsp;: cancelled&lt;br /&gt;
Time        &amp;amp;nbsp;: &lt;br /&gt;
Location    &amp;amp;nbsp;: &lt;br /&gt;
Details     &amp;amp;nbsp;: Exchange real-world experience about web testing tools. What is really useable and what is not.&lt;br /&gt;
Attendees   &amp;amp;nbsp;: Min 6, max 8, currently 3 attendees &lt;br /&gt;
&amp;lt;/pre&amp;gt; &lt;br /&gt;
== '''Meeting Minutes'''  ==&lt;br /&gt;
&lt;br /&gt;
=== Meeting minutes May 28th 2009  ===&lt;br /&gt;
&lt;br /&gt;
At May 28th, the Dutch OWASP chapter came together at the ASR building in Amersfoort. The main topic of the evening was AppSec 2009. There were 2 speakers and approximately 20 attendees.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; There was no sponsor talk or general announcement so after a very short welcome talk by Bert the evening started.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''First presentation:''' AppSec 2009 by Sebastien Deleersnyder. &amp;lt;br&amp;gt; The first presentation of the evening was a recap of AppSec 2009 in Poland. The conference was a big success with around 170 attendees. The meeting preceded the 2009 edition of Confidence [http://2009.confidence.org.pl/] resulting in a week of security presentations and workshops. All AppSec presentations and many movies, pictures, and other material can be found on the AppSec wiki [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2009_-_Poland] but a few items are worth mentioning in specific. First of all OWASP is growing and changing. These changes include a simplification of the membership fees, the introduction of a 'code of ethics', and a general review of all 120 projects. Other highlights are the project ASVS, which has reached an international standard status and updated versions of WebGoat and LabRat.&amp;lt;br&amp;gt; Lastly besides a Wiki and a LinkedIn group, OWASP is now also active on Twitter [http://twitter.com/owasp] &amp;amp;amp; [http://twitter.com/owasp_nl] and has two overview pages with all video [http://www.owasp.org/index.php/Category:OWASP_Video] and audio materials [http://www.owasp.org/index.php/OWASP_Podcast].&amp;lt;br&amp;gt; Feel free to use all the materials (as long as you abide by the new code of ethics off course) and visit the OWASP websites frequently for updates&amp;amp;nbsp;!&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Second presentation:''' VAC Cross-Site Request Forgery by Niels Teusink. &amp;lt;br&amp;gt; After succesfull VAC's about SQL injection and Cross-site scripting, the topic of this evening's VAC was Cross-site Request Forgery, also known as CSRF. CSRF is probably one of the least understood vulnerabilities, but can have tremendous consequences when succesfully exploited. In essence it is an attack that misuses the victim's autorisations with malicious scripts. CSRF attacks can also be easily combined with other attack, like e.g. XSS, making them even more dangerous. &amp;lt;br&amp;gt; Despite the name suggests, these attacks do not have to be on different websites (domains). With the continuing trend to combine multiple functionalities in a single application, so-called onsite request forgeries are becoming more and more frequent. Contrary to XSS and SQL injection, CSRF can not be blocked by input validation. In order to prevent these kind of attacks, an application has to able to verify the authenticity of a request. This can be achieved by several methods like using a unique identifier for a session or each request or requiring additional user input like a CAPTCHA or a one-time token. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Open Discussion''' &amp;lt;br&amp;gt; The evening was closed with an open discussion about how to improve knowledge sharing among the OWASP members. Many interesting discussions start during the drinks after the presentations on the OWASP evenings, discussions that sadly often are stopped prematurly due to time restraints.&amp;lt;br&amp;gt; As an addition on the quarterly presentation evenings, the Dutch chapter decided to also start mini-meetings and the OWASP cafe.&amp;lt;br&amp;gt; Mini-meetings will not be planned on beforehand, but instead will be planned when a topic is proposed and enough attendees have stated an interest in the topic. The attendees will have to select a location themselves but can request a donation from the OWASP for drinks and snacks. Topics discussed at the mini-meeting will have to be listed in minutes so other members can also profit from this knowledge exchange.&amp;lt;br&amp;gt; The OWASP cafe will be planned each first thursday of the month on a location that will be listed on the OWASP Dutch chapter site. The rules are simple: the evening starts at a certain time, ends at a certain time and will be filled with drinks, snacks, and nerd/hacker/geek humor and discussions in between.&amp;lt;br&amp;gt; Check the website frequently for the location of the next mini-meeting and OWASP cafe&amp;amp;nbsp;!&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Meeting minutes April 9th 2009  ===&lt;br /&gt;
&lt;br /&gt;
At April 9th, the Dutch OWASP chapter came together at the office of Sogeti in Vianen. The main topic of the evening was &amp;quot;knowing your enemy&amp;quot;. There were 3 speakers and approximately 50 attendees.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; The sponsor of the evening started with a small welcome and an overview of their internal security program named PASS. After some small announcements from the OWASP the evening started.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''First presentation:''' Modern information gathering; how to abuse search engines by Dave van Stein.&amp;lt;br&amp;gt; The first presentation of the evening was about using search engines and crawlers to gain detailed information about webservers and websites. Ill configured webservers allow search engine crawlers to collect much information about a system, information that is stored and can be retrieved with search engines. Many websites and tools make use of this mechanism and, combined with DNS and WHOIS information, are able to provide detailed or sensitive information like usernames, vulnerabilities, present files or network topology about a system without targeting it directly.&amp;lt;br&amp;gt; Restricting crawlers to access a system can act as a first line of defence and reduce exposure and risks.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Second presentation:''' VAC Cross-site scripting by Martin Visser. &amp;lt;br&amp;gt; The second VAC on an OWASP meeting was about Cross-site scripting also known as XSS. XSS vulnerabilities are often misunderstood and underestimated but facts show that XSS vulnerability abusing attacks are nowadys the fastest growing and most widespread type of exploit. In short XSS vulnerabilities allow for user input to be executed when containing javascript or HTML code. When combined with other vulnerabilities the possibilities of these attacks are vitually limitless.&amp;lt;br&amp;gt; The only way to prevent these attacks is to sanitize all input and output fields, but this can be more difficult than it appears to be. Simply blacklisting fragments like &amp;amp;lt;script&amp;amp;gt; is not sufficient due to the possibility of recursivity (e.g. &amp;amp;lt;scr&amp;amp;lt;script&amp;amp;gt;ipt&amp;amp;gt;) and encoding (e.g. URL encoding:&amp;amp;nbsp;%3C%73%63%72%69%70%74%3E). Using multiple layers of filters on various places is the only way to assure enough protection against these types of attacks.&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Third presentation:''' Beveiligingsaspecten van webapplicatie-ontwikkeling by Wouter van Kuipers. &amp;lt;br&amp;gt; The third presentation of the evening was about the efficiency of a source code analyer for php based websites. Approximately 33% of all websites use php and this can be explained by the low learning curve and ease of use of the language. Due to the low learning curve many php developers have little experience with programming and almost no awareness regading security resulting in many unsecure websites. Source code analysis can help preventing many security issues, but their usage does have some limitations. Firstly the scan on itself takes only a few minutes, but analysing the results requires much longer and depends greatly on how familiar the analyser is with the scanned source code. Second these analysers produce many flase positives, making analysis even more time consuming. Lastly not all vulnerabilities are detected with the same efficiency. Especially vulnerabilities that are dependent on the application logic like injection or XSS are not always efficiently detected.&amp;lt;br&amp;gt; Concluding, like all tools, a source code analyser can be a powerful tool, but one has to be aware of its limitations. These tools can provide results very fast, but when used on unfamiliar code the analysis can be very time consuming. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Scheduled OWASP NL Chapter Meetings:  ==&lt;br /&gt;
&lt;br /&gt;
=== Meeting Schedule September 24th 2009: Unautorized Access&amp;lt;br&amp;gt;  ===&lt;br /&gt;
&lt;br /&gt;
'''Summary:''' The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; border=&amp;quot;0&amp;quot; width=&amp;quot;500&amp;quot; align=&amp;quot;left&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| &lt;br /&gt;
Madison Gurkha &lt;br /&gt;
&lt;br /&gt;
Sofitel Cocagne Eindhoven&amp;lt;br&amp;gt;Vestdijk 47&amp;lt;br&amp;gt;5611 CA Eindhoven&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| [[Image:Logo Madison Gurkha.GIF|200px]]&amp;lt;br&amp;gt;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''18:00 - 18:30 Check-In (catering included)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''18:30 - 18:45 Introduction (OWASP organization, projects, sponsor)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''18.45 - 19.45 Unauthorized Access (Wil Allsopp)&amp;lt;br&amp;gt;''' &lt;br /&gt;
&lt;br /&gt;
Physical Penetration Testing and Social Engineering have been conducted by testing organisations for some time but there has been very little discussion within the industry regarding the use of formal approaches ensuring a consistently high quality and repeatability of the testing lifecycle. &lt;br /&gt;
&lt;br /&gt;
This was a problem I attempted to address in the book Unauthorized Access and is the focus of this discussion. &lt;br /&gt;
&lt;br /&gt;
We will look at the following: &lt;br /&gt;
&lt;br /&gt;
*What is physical penetration testing and what does it aim to achieve?&amp;lt;br&amp;gt; &lt;br /&gt;
*Tactical approaches to Social Engineering in testing.&amp;lt;br&amp;gt; &lt;br /&gt;
*The advantages and disadvantages of deploying SE.&amp;lt;br&amp;gt; &lt;br /&gt;
*Training operators and building operating teams - what skill sets should you deploy? &amp;lt;br&amp;gt; &lt;br /&gt;
*What are the legal aspects involved, how do these vary between jurisdictions? &amp;lt;br&amp;gt; &lt;br /&gt;
*How should you plan a physical penetration test at strategic, tactical and operational levels? &amp;lt;br&amp;gt; &lt;br /&gt;
*How do you gauge risk i.e. Contractual, Operational, Legal and Environmental?&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;The biggest problem currently facing physical penetration testing teams is that it's hard to prove a negative i.e. a failed test by no means guarantees the security of the client. By ensuring your team is trained and prepared you can mitigate this problem to a large degree.'''&amp;lt;br&amp;gt;'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''19.45 – 20.00 Break''' &lt;br /&gt;
&lt;br /&gt;
'''20. 00 – 20.30 Mini Meetings: Time- Box testing &amp;amp;amp; Test Tools (Barry van Kampen en Dave van Stein)&lt;br /&gt;
&lt;br /&gt;
'''20.30 – 21.00 Education Project (Martin Knobloch)'''&lt;br /&gt;
&lt;br /&gt;
'''21.00 – 21:30 Discussion, questions and social networking'''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Meeting Schedule May 28th 2009: AppSec Europe 2009  ===&lt;br /&gt;
&lt;br /&gt;
'''Summary''' The main goal of the upcoming OWASP-NL meeting is to provide an abstract of the recently held AppSec Europe 2009, a VAC about CSRF and, new, an open discussion on application security subjects brought forward by the attendees. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &lt;br /&gt;
ASR Nederland&amp;lt;br&amp;gt; &amp;lt;br&amp;gt; MD0.60 - Auditorium&amp;lt;br&amp;gt; Smallepad 30&amp;lt;br&amp;gt; 3811MG Amersfoort&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
[[Image:ASR Nederland logo.jpg|200px]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''18.45 - 19.45 AppSec-EU 2009 (Sebastien Deleersnyder, Telindus) '''&amp;lt;br&amp;gt; Update on the AppSec-EU 2009: &amp;lt;br&amp;gt; OWASP State of the union, an update on OWASP and OWASP projects and of course the highlights of the AppSec-EU 2009 presentations. &lt;br /&gt;
&lt;br /&gt;
'''19.45 - 20.00 Break '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.30 VAC Cross-Site Request Forgery (Niels Teusink, Fox-IT) ''' ([[Media:20090409_VAC-CSRF-Niels_Teusink.pdf]])&amp;lt;br&amp;gt; CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application. &lt;br /&gt;
&lt;br /&gt;
Niels Teusink holds a bachelor degree in Computer Science and has been experimenting with IT security for over a decade. He has worked for Fox-IT since 2005; first as a software engineer and since 2007 as a penetration tester. He has since performed dozens of penetration tests for all sorts of companies, including governments, banks and nuclear installations. &lt;br /&gt;
&lt;br /&gt;
'''20.30 - 21.15 Open session / discussion (Martin Knobloch/Ferdinand Vroom/Peter Gouwentak) ''' &amp;lt;br&amp;gt; Open session / discussion about subjects brought forward by the attendees. &lt;br /&gt;
&lt;br /&gt;
The Announcement of this meeting: [[Media:Announcement_OWASP-NL_May_28th_2009.pdf]]&amp;lt;br&amp;gt; The flyer of this meeting: [[Media:Owasp_NL_may2009.pdf]] &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
=== Meeting Schedule 9th April Knowing Your Enemy  ===&lt;br /&gt;
&lt;br /&gt;
'''Summary''' The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions. &lt;br /&gt;
&lt;br /&gt;
{|&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &lt;br /&gt;
Lange Dreef 17&amp;lt;br&amp;gt; 4131 NJ Vianen&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
[[Image:Sogeti Nederland b v Logo.jpg|http:\\www.sogeti.nl]] &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| width=&amp;quot;350&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| width=&amp;quot;650&amp;quot; | &lt;br /&gt;
About Sogeti Nederland B.V. Sogeti Nederland B.V. is one of top-5 IT companies of the Netherlands. Our workforce of over 3,500 employees provides top quality IT consultancy and services to leading companies in several industry sectors in the Netherlands. Our focus is local, but we are part of Sogeti Worldwide, offering IT services in the American, German, French, Belgian, UK, Swedish, Swiss and Spanish markets. &lt;br /&gt;
&lt;br /&gt;
Our core business is the design, construction, deployment, testing and maintenance of IT solutions. We stand for quality and IT skills; this is visible in our service and in the methods developed by us such as DYA®, Regatta®, TMap®, TPI® , Inframe®, and TEmb. &lt;br /&gt;
&lt;br /&gt;
Vision Sogeti delivers value by aligning the results of her services to the strategic goals of the client, thereby committing herself to the success of the client. We prove our commitment by assuming responsibility in various forms and to various degrees. &lt;br /&gt;
&lt;br /&gt;
New trends Our own research institute ViNT (Institute for Research into New Technology) keeps us and our clients ahead of the newest technology trends and their potential influence, benefits and risks. &amp;lt;br&amp;gt; More information about Sogeti can be found on our website www.sogeti.nl. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
'''18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt; '''18.45 - 19.30 Modern information gathering; how to abuse search engines Dave van Stein '''([[Media:20090409_passsive_reconnaissance-Dave_van_Stein.pdf]])&amp;lt;br&amp;gt; Great generals already know the key to success is &amp;quot;knowing your enemy&amp;quot;. In hacking terms this is called information gathering, fingerprinting or reconnaissance. Traditionally this phase consisted of using public records like WHOIS and DNS combined with active scans on servers. With the rise of advanced search engines like Yahoo, Live Search and Google a whole new type of reconnaissance has come to life; passive reconnaissance. Often servers are not properly configured which causes lots of valuable information to become available without accessing the server at all. Recently several hacker-tools appeared which use the full capabilities of these search engines giving hackers a head-start at mapping the network they plan to attack. The goal of this session is to give insight in the methods and tools hackers have at their disposal to gather information about systems they plan to attack without accessing the system itself. Dave van Stein has close to 8 years of experience in software testing. Since the beginning of 2008 he's working for ps_testware as a web application security testing specialist. &lt;br /&gt;
&lt;br /&gt;
'''19.30 - 20.00 VAC Cross-site scripting Martin Visser '''([[Media:20090409_VAC_Cross-site-scripting_Martin_Visser.pdf]])&amp;lt;br&amp;gt; Martin Visser is a software designer with Sogeti Nederland B.V. specialized in secure application development with Microsoft technologies. He has experience with Microsoft server technologies like ASP.NET, SharePoint and Biztalk. Martin also developed and teaches a 2-day &amp;quot;Application Security - Microsoft development&amp;quot; course both within and outside Sogeti. &lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.15 Break ''' &amp;lt;br&amp;gt; '''20.15 - 21.00 Beveiligingsaspecten van webapplicatie-ontwikkeling Wouter van Kuipers ''' ([[Media:20090409_presentatie_Wouter_van_Kuipers.pdf]])&amp;lt;br&amp;gt; Het ontwikkelen van webapplicaties verschilt op verschillende aspecten met het ontwikkelen van desktop applicaties, met name op het gebied van security. Voor grote bedrijven zijn er oplossingen beschikbaar als bijvoorbeeld SDL, maar voor het midden- en kleinbedrijf zijn dit soort oplossingen beperkt, omdat zij vaak niet de middelen hebben om dergelijke strategieën uit te kunnen voeren. Voor zijn scriptie heeft Wouter van Kuipers middels een literatuuronderzoek, interviews met ontwikkelaars en een onderzoek naar Fortify 360 gekeken hoe het midden- en kleinbedrijf omgaat met deze verschillen en hoe zij het ontwikkelproces kunnen optimaliseren op het gebied van security. &lt;br /&gt;
&lt;br /&gt;
Na een MBO opleiding in de IT is Wouter van Kuipers via de HBO opleiding 'Communicatie Systemen' begin 2007 begonnen met een master Informatiekunde aan de Radboud Universiteit Nijmegen, welke hij in maart dit jaar hoopt af te ronden. Tijdens zijn MBO studie is zijn interesse in het ontwikkelen van webapplicaties gewekt, wat in 2003 resulteerde in het opzetten van een eigen web-development bedrijf. Dit bedrijf is met name gespecialiseerd in het ontwikkelen van webapplicaties op maat, en het ondersteunen van bedrijven op het gebied van web-developement op freelance basis. &lt;br /&gt;
&lt;br /&gt;
The flyer of this meeting: [[Media:Owasp_NL_april2009.pdf]] &lt;br /&gt;
&lt;br /&gt;
== Past Events  ==&lt;br /&gt;
&lt;br /&gt;
*Events held in [[Netherlands Previous Events 2008|2008]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2007|2007]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2006|2006]] &lt;br /&gt;
*Events held in [[Netherlands Previous Events 2005|2005]]&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category_talk:OWASP_CAL9000_Project&amp;diff=64865</id>
		<title>Category talk:OWASP CAL9000 Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category_talk:OWASP_CAL9000_Project&amp;diff=64865"/>
				<updated>2009-06-25T10:22:04Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: /* Click the edit+ button to add a comment */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''We need your input! Ask questions, make comments or suggest new features for CAL9000 below.'''&lt;br /&gt;
&lt;br /&gt;
== Click the edit+ button to add a comment ==&lt;br /&gt;
&lt;br /&gt;
Edit this page and ask your question here&lt;br /&gt;
&lt;br /&gt;
= Link not functioning? =&lt;br /&gt;
Do we've got a broken link?&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;quot;* Click [http://www.digilantesecurity.com/CAL9000/files/CAL9000.zip here] to download the CAL9000 tool.&amp;quot;&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_Mini_Meeting_2009&amp;diff=64864</id>
		<title>Netherlands Mini Meeting 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_Mini_Meeting_2009&amp;diff=64864"/>
				<updated>2009-06-25T07:25:51Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Update on attendee''s&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Netherlands]] Calendar and Topics for OWASP NL Mini Meetings:&lt;br /&gt;
The 'Mini Meetings' are a informal platform to discus on a specific topic in a small group.&lt;br /&gt;
Chair is, whoever put's in a topic. You will get all support by the OWASP NL Chapter Board!&lt;br /&gt;
Those meetings must result in meeting notes and can result in a presentation on a OWASP NL Chapter meeting!&lt;br /&gt;
&lt;br /&gt;
== Mini Meeting Topics 2009 ==&lt;br /&gt;
&lt;br /&gt;
Topics addressed at the open discussion on the May 28th meeting:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Quickscans and other timeboxed test approaches (discussion)&lt;br /&gt;
Contact      : Barry van Kampen, owasp@itq.nl&lt;br /&gt;
----------&lt;br /&gt;
Date         : 25th june 2009&lt;br /&gt;
Time         : 18:00 Dinner (free of charge), 19:00 Start of discussion, Till ca 21:30&lt;br /&gt;
Location     : ITQ Consultancy&lt;br /&gt;
               Joop Geesinkweg 701 &lt;br /&gt;
               1096 AZ Amsterdam&lt;br /&gt;
Details      : This discussion will be about the way quickscans can be performed.&lt;br /&gt;
               At least basic web application testing knowledge is needed for this session.&lt;br /&gt;
               Please send an email if you would like to attend.&lt;br /&gt;
Total persons: 7 are attending, max 8 in total.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : SAMM, ASVS and other methodologies&lt;br /&gt;
Contact      : Martin Knobloch, martin.knobloch@owasp.org&lt;br /&gt;
----------&lt;br /&gt;
Date         : 23rd July 2009&lt;br /&gt;
Time         : 18:00 (dinner provided) to 21:30 &lt;br /&gt;
Location     : Sogeti Nederland B.V.&lt;br /&gt;
               Plotterweg 31-33&lt;br /&gt;
               3821 BB Amersfoort&lt;br /&gt;
Details      : About ideas and experiences of using, implementing and verifying the different methodologies&lt;br /&gt;
Attendees    : Max 10 persons, currently 0&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Tools of the trade; exchange real-life experiences&lt;br /&gt;
Contact      : Dave van Stein&lt;br /&gt;
----------&lt;br /&gt;
Date         : 27th August 2009&lt;br /&gt;
Time         : 18:00 (sandwiches provided) to 21:30&lt;br /&gt;
Location     : ps_testware&lt;br /&gt;
               Dorpsstraat 26&lt;br /&gt;
               3941 JM Doorn&lt;br /&gt;
Details      : Exchange real-world experience about web testing tools. What is really useable and what is not.&lt;br /&gt;
Attendees    : Max 8 persons, currently 2 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Web Application Firewalls&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
Attendees    : Max 10 persons, currently 0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Add your own suggestions below:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : suggest a topic&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
Attendees    : Max 10 persons, currently 0&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Mini Meeting minutes ==&lt;br /&gt;
Space below is mend to put the Mini-Meeting-Note!&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to attend, please send an email to the contact of the topic.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
All OWASP chapter meetings are free of charge and you don’t have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=64774</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=64774"/>
				<updated>2009-06-23T11:32:41Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: /* Meeting minutes May 28th 2009 */  Added twitter NL to the meeting minutes&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=The chapter leader is [mailto:owasp@irc2.nl Bert Koelewijn]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}}&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers ===&lt;br /&gt;
We are continuously looking for speakers and presentations make the chapter meetings as interesting as possible. Therefore we are looking inside and outside OWASP for known international specialists. But we know, there is a lot interesting stuf happening inside the Netherlands, too!  &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presentations:''' Are you working on interesting subject, you would like to share your experiences with the OWASP community. Any topic related to application security will be appreciated!&amp;lt;br/&amp;gt;&lt;br /&gt;
'''VAC, Vulnerability, Attack, Countermeasure:''' The goal is an half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sponsorship of a local chapter meeting ===&lt;br /&gt;
We are continuously looking for locations to hold local chapter meetings. Therefore, we need companies willing to sponsor of host events.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Hosting a local chapter meeting:''' To host a local chapter meeting, you facilitate the meeting location and beverage for the attendees&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsorship of a local chapter meeting:''' You cover the cost of renting the location for the meeting and the payment of the beverages for the attendees&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please let us know via the OWASP chapter meeting questionnaire of via email to martin.knobloch@owasp.org&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== '''OWASP NL Cafe''' == &lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;'''NEW:'''&amp;lt;/font&amp;gt;&lt;br /&gt;
Monthly informal platform to speak about (Web) application security matters! No registration required, just drop by!&lt;br /&gt;
* no programm&lt;br /&gt;
* no agenda&lt;br /&gt;
* whatever comes up!&lt;br /&gt;
&lt;br /&gt;
=== Next OWASP Cafe:===&lt;br /&gt;
&lt;br /&gt;
 Tuesday July 7th, from 7 pm, drop in whenever you can!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Where:&lt;br /&gt;
   Prof. Dr. Ornsteinlaan 14&lt;br /&gt;
   3431 EP Nieuwegein&lt;br /&gt;
Public transport from Utrecht Centraal:&lt;br /&gt;
    Bus 74, bus stop &amp;quot;Zorgcentrum Zuilenstein&amp;quot;  Nieuwegein (2 min walk)&lt;br /&gt;
    Streetcar / Tram stop: &amp;quot;Batau Noord&amp;quot; Nieuwegein (8 min walk)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=prof.+dr.+ornsteinlaan+14,+3431+EP+Nieuwegein&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=42.901912,58.095703&amp;amp;ie=UTF8&amp;amp;z=16 Google maps of the next Café]&amp;lt;br&amp;gt;&lt;br /&gt;
The flyer of this café: [[Media:owasp_NL_cafe_july2009.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''OWASP NL Chapter Meetings Schedule 2009''' ==&lt;br /&gt;
This is an overview of the 2009 local chapter meeting schedule. Details of the meetings can be found in the announcements that will be posted below this schedule.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
April 9th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 18.00 - 21.30&lt;br /&gt;
Main Topic   : Knowing Your Enemy&lt;br /&gt;
Presentations: Modern information gathering; how to abuse search engines         Dave van Stein&lt;br /&gt;
               VAC Cross-site scripting                                          Martin Visser &lt;br /&gt;
               Beveiligingsaspecten van webapplicatie-ontwikkeling               Wouter van Kuipers &lt;br /&gt;
Location     : Lange Dreef 17&lt;br /&gt;
               4131 NJ Vianen&lt;br /&gt;
Sponsor      : Sogeti Nederland B.V.&lt;br /&gt;
&lt;br /&gt;
May 28th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 18.00 - 21.30&lt;br /&gt;
Main Topic   : AppSec Europe 2009&lt;br /&gt;
Presentations: AppSec-EU 2009                                                    Sebastien Deleersnyder, Telindus &lt;br /&gt;
               VAC Cross-Site Request Forgery                                    Niels Teusink&lt;br /&gt;
               Open session / discussion about subjects brought forward by &lt;br /&gt;
               the attendees                                                     Martin Knobloch/Ferdinand Vroom/Peter Gouwentak&lt;br /&gt;
Location     : ASR Nederland&lt;br /&gt;
               MD0.60 - Auditorium&lt;br /&gt;
               Smallepad 30&lt;br /&gt;
               3811MG Amersfoort&lt;br /&gt;
Sponsor      : ASR Nederland&lt;br /&gt;
&lt;br /&gt;
September 24th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&lt;br /&gt;
December 10th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br&amp;gt;&lt;br /&gt;
If you want to attend, please send an email to: bert.koelewijn@owasp.org&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
All OWASP chapter meetings are free of charge and you don't have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
NOTE TO CISSP's: OWASP Meetings count towards CPE Credits.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''OWASP NL Mini-Meetings''' == &lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;'''NEW:'''&amp;lt;/font&amp;gt;&lt;br /&gt;
Platform to discus on specific issues related to (Web) Application Security. The topic's are brought in by the OWASP NL community!&amp;lt;br&amp;gt;&lt;br /&gt;
Something on your mind to discus, put your idea online at: Mini Meetings [[Netherlands_Mini_Meeting_2009|Netherlands_Mini_Meeting_2009]]&lt;br /&gt;
&lt;br /&gt;
=== Mini-Meeting Scheduled: ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Quickscans and other timeboxed test approaches (discussion)&lt;br /&gt;
Contact      : Barry van Kampen, owasp@itq.nl&lt;br /&gt;
----------&lt;br /&gt;
Date         : 25th june 2009&lt;br /&gt;
Time         : 18:00 Diner (free of charge), 19:00 Start of discussion, Till ca 21:30&lt;br /&gt;
Location     : ITQ Consultancy&lt;br /&gt;
               Joop Geesinkweg 701 &lt;br /&gt;
               1096 AZ Amsterdam&lt;br /&gt;
Details      : This discussion will be about the way quickscans can be performed.&lt;br /&gt;
               At least basic web application testing knowledge is needed for this session.&lt;br /&gt;
               Max 8 persons in total, please send an email if you would like to attend &lt;br /&gt;
&lt;br /&gt;
Topic        : SAMM, ASVS and other methodologies&lt;br /&gt;
Contact      : Martin Knobloch&lt;br /&gt;
----------&lt;br /&gt;
Date         : 23rd July 2009&lt;br /&gt;
Time         : 18:00 (dinner provided) to 21:30 &lt;br /&gt;
Location     : Sogeti Nederland B.V.&lt;br /&gt;
               Plotterweg 31-33&lt;br /&gt;
               3821 BB Amersfoort&lt;br /&gt;
Details      : About ideas and experiences of using, implementing and verifying the different methodologies&lt;br /&gt;
&lt;br /&gt;
Topic        : Tools of the trade; exchange real-life experiences&lt;br /&gt;
Contact      : Dave van Stein&lt;br /&gt;
----------&lt;br /&gt;
Date         : 27th August 2009&lt;br /&gt;
Time         : 18:00 (sandwiches provided) to 21:30&lt;br /&gt;
Location     : ps_testware&lt;br /&gt;
               Dorpsstraat 26&lt;br /&gt;
               3941 JM Doorn&lt;br /&gt;
Details      : Exchange real-world experience about web testing tools. What is really useable and what is not.&lt;br /&gt;
Attendees    : Max 8 persons, currently 2 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Minutes''' ==&lt;br /&gt;
=== Meeting minutes May 28th 2009 ===&lt;br /&gt;
&lt;br /&gt;
At May 28th, the Dutch OWASP chapter came together at the ASR building in Amersfoort. The main topic of the evening was AppSec 2009. There were 2 speakers and approximately 20 attendees.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
There was no sponsor talk or general announcement so after a very short welcome talk by Bert the evening started.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''First presentation:''' AppSec 2009 by Sebastien Deleersnyder. &amp;lt;br/&amp;gt;&lt;br /&gt;
The first presentation of the evening was a recap of AppSec 2009 in Poland. The conference was a big success with around 170 attendees. The meeting preceded the 2009 edition of Confidence [http://2009.confidence.org.pl/] resulting in a week of security presentations and workshops. All AppSec presentations and many movies, pictures, and other material can be found on the AppSec wiki [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2009_-_Poland] but a few items are worth mentioning in specific. First of all OWASP is growing and changing. These changes include a simplification of the membership fees, the introduction of a 'code of ethics', and a general review of all 120 projects. Other highlights are the project ASVS, which has reached an international standard status and updated versions of WebGoat and LabRat.&amp;lt;br/&amp;gt;&lt;br /&gt;
Lastly besides a Wiki and a LinkedIn group, OWASP is now also active on Twitter [http://twitter.com/owasp] &amp;amp; [http://twitter.com/owasp_nl] and has two overview pages with all video [http://www.owasp.org/index.php/Category:OWASP_Video] and audio materials [http://www.owasp.org/index.php/OWASP_Podcast].&amp;lt;br/&amp;gt;&lt;br /&gt;
Feel free to use all the materials (as long as you abide by the new code of ethics off course) and visit the OWASP websites frequently for updates !&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Second presentation:''' VAC Cross-Site Request Forgery by Niels Teusink. &amp;lt;br/&amp;gt;&lt;br /&gt;
After succesfull VAC's about SQL injection and Cross-site scripting, the topic of this evening's VAC was Cross-site Request Forgery, also known as CSRF. CSRF is probably one of the least understood vulnerabilities, but can have tremendous consequences when succesfully exploited. In essence it is an attack that misuses the victim's autorisations with malicious scripts. CSRF attacks can also be easily combined with other attack, like e.g. XSS, making them even more dangerous. &amp;lt;br/&amp;gt;&lt;br /&gt;
Despite the name suggests, these attacks do not have to be on different websites (domains). With the continuing trend to combine multiple functionalities in a single application, so-called onsite request forgeries are becoming more and more frequent. Contrary to XSS and SQL injection, CSRF can not be blocked by input validation. In order to prevent these kind of attacks, an application has to able to verify the authenticity of a request. This can be achieved by several methods like using a unique identifier for a session or each request or requiring additional user input like a CAPTCHA or a one-time token. &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Open Discussion''' &amp;lt;br/&amp;gt;&lt;br /&gt;
The evening was closed with an open discussion about how to improve knowledge sharing among the OWASP members. Many interesting discussions start during the drinks after the presentations on the OWASP evenings, discussions that sadly often are stopped prematurly due to time restraints.&amp;lt;br/&amp;gt;&lt;br /&gt;
As an addition on the quarterly presentation evenings, the Dutch chapter decided to also start mini-meetings and the OWASP cafe.&amp;lt;br/&amp;gt;&lt;br /&gt;
Mini-meetings will not be planned on beforehand, but instead will be planned when a topic is proposed and enough attendees have stated an interest in the topic. The attendees will have to select a location themselves but can request a donation from the OWASP for drinks and snacks. Topics discussed at the mini-meeting will have to be listed in minutes so other members can also profit from this knowledge exchange.&amp;lt;br/&amp;gt;&lt;br /&gt;
The OWASP cafe will be planned each first thursday of the month on a location that will be listed on the OWASP Dutch chapter site. The rules are simple: the evening starts at a certain time, ends at a certain time and will be filled with drinks, snacks, and nerd/hacker/geek humor and discussions in between.&amp;lt;br/&amp;gt;&lt;br /&gt;
Check the website frequently for the location of the next mini-meeting and OWASP cafe !&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Meeting minutes April 9th 2009 ===&lt;br /&gt;
&lt;br /&gt;
At April 9th, the Dutch OWASP chapter came together at the office of Sogeti in Vianen. The main topic of the evening was &amp;quot;knowing your enemy&amp;quot;. There were 3 speakers and approximately 50 attendees.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
The sponsor of the evening started with a small welcome and an overview of their internal security program named PASS. After some small announcements from the OWASP the evening started.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''First presentation:''' Modern information gathering; how to abuse search engines by Dave van Stein.&amp;lt;br/&amp;gt;&lt;br /&gt;
The first presentation of the evening was about using search engines and crawlers to gain detailed information about webservers and websites. Ill configured webservers allow search engine crawlers to collect much information about a system, information that is stored and can be retrieved with search engines. Many websites and tools make use of this mechanism and, combined with DNS and WHOIS information, are able to provide detailed or sensitive information like usernames, vulnerabilities, present files or network topology about a system without targeting it directly.&amp;lt;br/&amp;gt;&lt;br /&gt;
Restricting crawlers to access a system can act as a first line of defence and reduce exposure and risks.&amp;lt;br/&amp;gt;   &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Second presentation:''' VAC Cross-site scripting by Martin Visser. &amp;lt;br/&amp;gt;&lt;br /&gt;
The second VAC on an OWASP meeting was about Cross-site scripting also known as XSS. XSS vulnerabilities are often misunderstood and underestimated but facts show that XSS vulnerability abusing attacks are nowadys the fastest growing and most widespread type of exploit. In short XSS vulnerabilities allow for user input to be executed when containing javascript or HTML code. When combined with other vulnerabilities the possibilities of these attacks are vitually limitless.&amp;lt;br/&amp;gt;&lt;br /&gt;
The only way to prevent these attacks is to sanitize all input and output fields, but this can be more difficult than it appears to be. Simply blacklisting fragments like &amp;lt;script&amp;gt; is not sufficient due to the possibility of recursivity (e.g. &amp;lt;scr&amp;lt;script&amp;gt;ipt&amp;gt;) and encoding (e.g. URL encoding: %3C%73%63%72%69%70%74%3E). Using multiple layers of filters on various places is the only way to assure enough protection against these types of attacks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Third presentation:''' Beveiligingsaspecten van webapplicatie-ontwikkeling by Wouter van Kuipers. &amp;lt;br/&amp;gt;&lt;br /&gt;
The third presentation of the evening was about the efficiency of a source code analyer for php based websites. Approximately 33% of all websites use php and this can be explained by the low learning curve and ease of use of the language. Due to the low learning curve many php developers have little experience with programming and almost no awareness regading security resulting in many unsecure websites. Source code analysis can help preventing many security issues, but their usage does have some limitations. Firstly the scan on itself takes only a few minutes, but analysing the results requires much longer and depends greatly on how familiar the analyser is with the scanned source code. Second these analysers produce many flase positives, making analysis even more time consuming. Lastly not all vulnerabilities are detected with the same efficiency. Especially vulnerabilities that are dependent on the application logic like injection or XSS are not always efficiently detected.&amp;lt;br/&amp;gt;&lt;br /&gt;
Concluding, like all tools, a source code analyser can be a powerful tool, but one has to be aware of its limitations. These tools can provide results very fast, but when used on unfamiliar code the analysis can be very time consuming.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Scheduled OWASP NL Chapter Meetings: ==&lt;br /&gt;
=== Meeting Schedule May 28th 2009: AppSec Europe 2009 ===&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
The main goal of the upcoming OWASP-NL meeting is to provide an abstract of the recently held AppSec Europe 2009, a VAC about CSRF and, new, an open discussion on application security subjects brought forward by the attendees. &lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
ASR Nederland&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
MD0.60 - Auditorium&amp;lt;br/&amp;gt;&lt;br /&gt;
Smallepad 30&amp;lt;br/&amp;gt;&lt;br /&gt;
3811MG Amersfoort&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:ASR Nederland logo.jpg|200px]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.45 - 19.45 AppSec-EU 2009  (Sebastien Deleersnyder, Telindus) '''&amp;lt;br&amp;gt;&lt;br /&gt;
Update on the AppSec-EU 2009: &amp;lt;br&amp;gt;&lt;br /&gt;
OWASP State of the union, an update on OWASP and OWASP projects and of course the highlights of the AppSec-EU 2009 presentations.&lt;br /&gt;
&lt;br /&gt;
'''19.45 - 20.00 Break '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.30 VAC Cross-Site Request Forgery (Niels Teusink, Fox-IT) '''  ([[Media:20090409_VAC-CSRF-Niels_Teusink.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.&lt;br /&gt;
&lt;br /&gt;
Niels Teusink holds a bachelor degree in Computer Science and has been experimenting with IT security for over a decade. He has worked for Fox-IT since 2005; first as a software engineer and since 2007 as a penetration tester. He has since performed dozens of penetration tests for all sorts of companies, including governments, banks and nuclear installations.&lt;br /&gt;
&lt;br /&gt;
'''20.30 - 21.15 Open session / discussion  (Martin Knobloch/Ferdinand Vroom/Peter Gouwentak) ''' &amp;lt;br&amp;gt;&lt;br /&gt;
Open session / discussion about subjects brought forward by the attendees.&lt;br /&gt;
&lt;br /&gt;
The Announcement of this meeting: [[Media:Announcement OWASP-NL May 28th 2009.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
The flyer of this meeting: [[Media:owasp_NL_may2009.pdf]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
=== Meeting Schedule 9th April Knowing Your Enemy ===&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions. &lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
Lange Dreef 17&amp;lt;br/&amp;gt;&lt;br /&gt;
4131 NJ Vianen&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Sogeti_Nederland_b_v_Logo.jpg|http:\\www.sogeti.nl]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
About Sogeti Nederland B.V.&lt;br /&gt;
Sogeti Nederland B.V. is one of top-5 IT companies of the Netherlands. Our workforce of over 3,500 employees provides top quality IT consultancy and services to leading companies in several industry sectors in the Netherlands. Our focus is local, but we are part of Sogeti Worldwide, offering IT services in the American, German, French, Belgian, UK, Swedish, Swiss and Spanish markets. &lt;br /&gt;
&lt;br /&gt;
Our core business is the design, construction, deployment, testing and maintenance of IT solutions. We stand for quality and IT skills; this is visible in our service and in the methods developed by us such as DYA®, Regatta®, TMap®, TPI® , Inframe®, and TEmb. &lt;br /&gt;
&lt;br /&gt;
Vision&lt;br /&gt;
Sogeti delivers value by aligning the results of her services to the strategic goals of the client, thereby committing herself to the success of the client. We prove our commitment by assuming responsibility in various forms and to various degrees.  &lt;br /&gt;
&lt;br /&gt;
New trends&lt;br /&gt;
Our own research institute ViNT (Institute for Research into New Technology) keeps us and our clients ahead of the newest technology trends and their potential influence, benefits and risks.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
More information about Sogeti can be found on our website www.sogeti.nl.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt;&lt;br /&gt;
'''18.45 - 19.30 Modern information gathering; how to abuse search engines             Dave van Stein '''([[Media:20090409_passsive_reconnaissance-Dave_van_Stein.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Great generals already know the key to success is &amp;quot;knowing your enemy&amp;quot;. In hacking terms this is called information gathering, fingerprinting or reconnaissance. Traditionally this phase consisted of using public records like WHOIS and DNS combined with active scans on servers. With the rise of advanced search engines like Yahoo, Live Search and Google a whole new type of reconnaissance has come to life; passive reconnaissance. Often servers are not properly configured which causes lots of valuable information to become available without accessing the server at all. Recently several hacker-tools appeared which use the full capabilities of these search engines giving hackers a head-start at mapping the network they plan to attack. The goal of this session is to give insight in the methods and tools hackers have at their disposal to gather information about systems they plan to attack without accessing the system itself. &lt;br /&gt;
Dave van Stein has close to 8 years of experience in software testing. Since the beginning of 2008 he's working for ps_testware as a web application security testing specialist. &lt;br /&gt;
&lt;br /&gt;
'''19.30 - 20.00 VAC Cross-site scripting      Martin Visser '''([[Media:20090409_VAC_Cross-site-scripting_Martin_Visser.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Martin Visser is a software designer with Sogeti Nederland B.V. specialized in secure application development with Microsoft technologies. He has experience with Microsoft server technologies like ASP.NET, SharePoint and Biztalk. Martin also developed and teaches a 2-day &amp;quot;Application Security - Microsoft development&amp;quot; course both within and outside Sogeti. &lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.15 Break ''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''20.15 - 21.00 Beveiligingsaspecten van webapplicatie-ontwikkeling Wouter van Kuipers ''' ([[Media:20090409_presentatie_Wouter_van_Kuipers.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Het ontwikkelen van webapplicaties verschilt op verschillende aspecten met het ontwikkelen van desktop applicaties, met name op het gebied van security. Voor grote bedrijven zijn er oplossingen beschikbaar als bijvoorbeeld SDL, maar voor het midden- en kleinbedrijf zijn dit soort oplossingen beperkt, omdat zij vaak niet de middelen hebben om dergelijke strategieën uit te kunnen voeren.  Voor zijn scriptie heeft Wouter van Kuipers middels een literatuuronderzoek, interviews met ontwikkelaars en een onderzoek naar Fortify 360 gekeken hoe het midden- en kleinbedrijf omgaat met deze verschillen en hoe zij het ontwikkelproces kunnen optimaliseren op het gebied van security.&lt;br /&gt;
&lt;br /&gt;
Na een MBO opleiding in de IT is Wouter van Kuipers via de HBO opleiding 'Communicatie Systemen' begin 2007 begonnen met een master&lt;br /&gt;
Informatiekunde aan de Radboud Universiteit Nijmegen, welke hij in maart dit jaar hoopt af te ronden. Tijdens zijn MBO studie is zijn interesse in het ontwikkelen van webapplicaties gewekt, wat in 2003 resulteerde in het opzetten van een eigen web-development bedrijf. Dit bedrijf is met name gespecialiseerd in het ontwikkelen van webapplicaties op maat, en het ondersteunen van bedrijven op het gebied van web-developement op freelance basis.&lt;br /&gt;
&lt;br /&gt;
The flyer of this meeting: [[Media:owasp_NL_april2009.pdf]]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2008|2008]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2007|2007]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2006|2006]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2005|2005]]&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_NL_cafe_july2009.pdf&amp;diff=64140</id>
		<title>File:Owasp NL cafe july2009.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_NL_cafe_july2009.pdf&amp;diff=64140"/>
				<updated>2009-06-12T14:41:18Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: THe flyer of the OWASP Café meeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;THe flyer of the OWASP Café meeting&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=64139</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=64139"/>
				<updated>2009-06-12T14:40:33Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Added flyer OWASP Café July 2009, changed google maps link of OWASP Café&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=The chapter leader is [mailto:owasp@irc2.nl Bert Koelewijn]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}}&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers ===&lt;br /&gt;
We are continuously looking for speakers and presentations make the chapter meetings as interesting as possible. Therefore we are looking inside and outside OWASP for known international specialists. But we know, there is a lot interesting stuf happening inside the Netherlands, too!  &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presentations:''' Are you working on interesting subject, you would like to share your experiences with the OWASP community. Any topic related to application security will be appreciated!&amp;lt;br/&amp;gt;&lt;br /&gt;
'''VAC, Vulnerability, Attack, Countermeasure:''' The goal is an half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sponsorship of a local chapter meeting ===&lt;br /&gt;
We are continuously looking for locations to hold local chapter meetings. Therefore, we need companies willing to sponsor of host events.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Hosting a local chapter meeting:''' To host a local chapter meeting, you facilitate the meeting location and beverage for the attendees&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsorship of a local chapter meeting:''' You cover the cost of renting the location for the meeting and the payment of the beverages for the attendees&amp;lt;br&amp;gt;&lt;br /&gt;
'''Please let us know via the OWASP chapter meeting questionnaire of via email to martin.knobloch@owasp.org&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== '''OWASP NL Cafe''' == &lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;'''NEW:'''&amp;lt;/font&amp;gt;&lt;br /&gt;
Monthly informal platform to speak about (Web) application security matters! No registration required, just drop by!&lt;br /&gt;
* no programm&lt;br /&gt;
* no agenda&lt;br /&gt;
* whatever comes up!&lt;br /&gt;
&lt;br /&gt;
=== Next OWASP Cafe:===&lt;br /&gt;
&lt;br /&gt;
 Tuesday July 7th, from 7 pm, drop in whenever you can!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Where:&lt;br /&gt;
   Prof. Dr. Ornsteinlaan 14&lt;br /&gt;
   3431 EP Nieuwegein&lt;br /&gt;
Public transport from Utrecht Centraal:&lt;br /&gt;
    Bus 74, bus stop &amp;quot;Zorgcentrum Zuilenstein&amp;quot;  Nieuwegein (2 min walk)&lt;br /&gt;
    Streetcar / Tram stop: &amp;quot;Batau Noord&amp;quot; Nieuwegein (8 min walk)&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=prof.+dr.+ornsteinlaan+14,+3431+EP+Nieuwegein&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=42.901912,58.095703&amp;amp;ie=UTF8&amp;amp;z=16 Google maps of the next Café]&amp;lt;br&amp;gt;&lt;br /&gt;
The flyer of this café: [[Media:owasp_NL_cafe_july2009.pdf]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''OWASP NL Chapter Meetings Schedule 2009''' ==&lt;br /&gt;
This is an overview of the 2009 local chapter meeting schedule. Details of the meetings can be found in the announcements that will be posted below this schedule.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
April 9th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 18.00 - 21.30&lt;br /&gt;
Main Topic   : Knowing Your Enemy&lt;br /&gt;
Presentations: Modern information gathering; how to abuse search engines         Dave van Stein&lt;br /&gt;
               VAC Cross-site scripting                                          Martin Visser &lt;br /&gt;
               Beveiligingsaspecten van webapplicatie-ontwikkeling               Wouter van Kuipers &lt;br /&gt;
Location     : Lange Dreef 17&lt;br /&gt;
               4131 NJ Vianen&lt;br /&gt;
Sponsor      : Sogeti Nederland B.V.&lt;br /&gt;
&lt;br /&gt;
May 28th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 18.00 - 21.30&lt;br /&gt;
Main Topic   : AppSec Europe 2009&lt;br /&gt;
Presentations: AppSec-EU 2009                                                    Sebastien Deleersnyder, Telindus &lt;br /&gt;
               VAC Cross-Site Request Forgery                                    Niels Teusink&lt;br /&gt;
               Open session / discussion about subjects brought forward by &lt;br /&gt;
               the attendees                                                     Martin Knobloch/Ferdinand Vroom/Peter Gouwentak&lt;br /&gt;
Location     : ASR Nederland&lt;br /&gt;
               MD0.60 - Auditorium&lt;br /&gt;
               Smallepad 30&lt;br /&gt;
               3811MG Amersfoort&lt;br /&gt;
Sponsor      : ASR Nederland&lt;br /&gt;
&lt;br /&gt;
September 24th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&lt;br /&gt;
December 10th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br&amp;gt;&lt;br /&gt;
If you want to attend, please send an email to: bert.koelewijn@owasp.org&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
All OWASP chapter meetings are free of charge and you don't have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
NOTE TO CISSP's: OWASP Meetings count towards CPE Credits.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=='''OWASP NL Mini-Meetings''' == &lt;br /&gt;
&amp;lt;font color=&amp;quot;red&amp;quot;&amp;gt;'''NEW:'''&amp;lt;/font&amp;gt;&lt;br /&gt;
Platform to discus on specific issues related to (Web) Application Security. The topic's are brought in by the OWASP NL community!&amp;lt;br&amp;gt;&lt;br /&gt;
Something on your mind to discus, put your idea online at: Mini Meetings [[Netherlands_Mini_Meeting_2009|Netherlands_Mini_Meeting_2009]]&lt;br /&gt;
&lt;br /&gt;
=== Mini-Meeting Scheduled: ===&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Quickscans and other timeboxed test approaches (discussion)&lt;br /&gt;
Contact      : Barry van Kampen, owasp@itq.nl&lt;br /&gt;
----------&lt;br /&gt;
Date         : 25th june 2009&lt;br /&gt;
Time         : 18:00 Diner (free of charge), 19:00 Start of discussion, Till ca 21:30&lt;br /&gt;
Location     : ITQ Consultancy&lt;br /&gt;
               Joop Geesinkweg 701 &lt;br /&gt;
               1096 AZ Amsterdam&lt;br /&gt;
Details      : This discussion will be about the way quickscans can be performed.&lt;br /&gt;
               At least basic web application testing knowledge is needed for this session.&lt;br /&gt;
               Max 8 persons in total, please send an email if you would like to attend &lt;br /&gt;
&lt;br /&gt;
Topic        : SAMM, ASVS and other methodologies&lt;br /&gt;
Contact      : Martin Knobloch&lt;br /&gt;
----------&lt;br /&gt;
Date         : 23rd July 2009&lt;br /&gt;
Time         : 18:00 (dinner provided) to 21:30 &lt;br /&gt;
Location     : Sogeti Nederland B.V.&lt;br /&gt;
               Plotterweg 31-33&lt;br /&gt;
               3821 BB Amersfoort&lt;br /&gt;
Details      : About ideas and experiences of using, implementing and verifying the different methodologies&lt;br /&gt;
&lt;br /&gt;
Topic        : Tools of the trade; exchange real-life experiences&lt;br /&gt;
Contact      : Dave van Stein&lt;br /&gt;
----------&lt;br /&gt;
Date         : 27th August 2009&lt;br /&gt;
Time         : 18:00 (sandwiches provided) to 21:30&lt;br /&gt;
Location     : ps_testware&lt;br /&gt;
               Dorpsstraat 26&lt;br /&gt;
               3941 JM Doorn&lt;br /&gt;
Details      : Exchange real-world experience about web testing tools. What is really useable and what is not.&lt;br /&gt;
Attendees    : Max 8 persons, currently 2 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== '''Meeting Minutes''' ==&lt;br /&gt;
=== Meeting minutes May 28th 2009 ===&lt;br /&gt;
&lt;br /&gt;
At May 28th, the Dutch OWASP chapter came together at the ASR building in Amersfoort. The main topic of the evening was AppSec 2009. There were 2 speakers and approximately 20 attendees.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
There was no sponsor talk or general announcement so after a very short welcome talk by Bert the evening started.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''First presentation:''' AppSec 2009 by Sebastien Deleersnyder. &amp;lt;br/&amp;gt;&lt;br /&gt;
The first presentation of the evening was a recap of AppSec 2009 in Poland. The conference was a big success with around 170 attendees. The meeting preceded the 2009 edition of Confidence [http://2009.confidence.org.pl/] resulting in a week of security presentations and workshops. All AppSec presentations and many movies, pictures, and other material can be found on the AppSec wiki [http://www.owasp.org/index.php/OWASP_AppSec_Europe_2009_-_Poland] but a few items are worth mentioning in specific. First of all OWASP is growing and changing. These changes include a simplification of the membership fees, the introduction of a 'code of ethics', and a general review of all 120 projects. Other highlights are the project ASVS, which has reached an international standard status and updated versions of WebGoat and LabRat.&amp;lt;br/&amp;gt;&lt;br /&gt;
Lastly besides a Wiki and a LinkedIn group, OWASP is now also active on Twitter [http://twitter.com/owasp] and has two overview pages with all video [http://www.owasp.org/index.php/Category:OWASP_Video] and audio materials [http://www.owasp.org/index.php/OWASP_Podcast].&amp;lt;br/&amp;gt;&lt;br /&gt;
Feel free to use all the materials (as long as you abide by the new code of ethics off course) and visit the OWASP websites frequently for updates !&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Second presentation:''' VAC Cross-Site Request Forgery by Niels Teusink. &amp;lt;br/&amp;gt;&lt;br /&gt;
After succesfull VAC's about SQL injection and Cross-site scripting, the topic of this evening's VAC was Cross-site Request Forgery, also known as CSRF. CSRF is probably one of the least understood vulnerabilities, but can have tremendous consequences when succesfully exploited. In essence it is an attack that misuses the victim's autorisations with malicious scripts. CSRF attacks can also be easily combined with other attack, like e.g. XSS, making them even more dangerous. &amp;lt;br/&amp;gt;&lt;br /&gt;
Despite the name suggests, these attacks do not have to be on different websites (domains). With the continuing trend to combine multiple functionalities in a single application, so-called onsite request forgeries are becoming more and more frequent. Contrary to XSS and SQL injection, CSRF can not be blocked by input validation. In order to prevent these kind of attacks, an application has to able to verify the authenticity of a request. This can be achieved by several methods like using a unique identifier for a session or each request or requiring additional user input like a CAPTCHA or a one-time token. &amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Open Discussion''' &amp;lt;br/&amp;gt;&lt;br /&gt;
The evening was closed with an open discussion about how to improve knowledge sharing among the OWASP members. Many interesting discussions start during the drinks after the presentations on the OWASP evenings, discussions that sadly often are stopped prematurly due to time restraints.&amp;lt;br/&amp;gt;&lt;br /&gt;
As an addition on the quarterly presentation evenings, the Dutch chapter decided to also start mini-meetings and the OWASP cafe.&amp;lt;br/&amp;gt;&lt;br /&gt;
Mini-meetings will not be planned on beforehand, but instead will be planned when a topic is proposed and enough attendees have stated an interest in the topic. The attendees will have to select a location themselves but can request a donation from the OWASP for drinks and snacks. Topics discussed at the mini-meeting will have to be listed in minutes so other members can also profit from this knowledge exchange.&amp;lt;br/&amp;gt;&lt;br /&gt;
The OWASP cafe will be planned each first thursday of the month on a location that will be listed on the OWASP Dutch chapter site. The rules are simple: the evening starts at a certain time, ends at a certain time and will be filled with drinks, snacks, and nerd/hacker/geek humor and discussions in between.&amp;lt;br/&amp;gt;&lt;br /&gt;
Check the website frequently for the location of the next mini-meeting and OWASP cafe !&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Meeting minutes April 9th 2009 ===&lt;br /&gt;
&lt;br /&gt;
At April 9th, the Dutch OWASP chapter came together at the office of Sogeti in Vianen. The main topic of the evening was &amp;quot;knowing your enemy&amp;quot;. There were 3 speakers and approximately 50 attendees.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
The sponsor of the evening started with a small welcome and an overview of their internal security program named PASS. After some small announcements from the OWASP the evening started.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''First presentation:''' Modern information gathering; how to abuse search engines by Dave van Stein.&amp;lt;br/&amp;gt;&lt;br /&gt;
The first presentation of the evening was about using search engines and crawlers to gain detailed information about webservers and websites. Ill configured webservers allow search engine crawlers to collect much information about a system, information that is stored and can be retrieved with search engines. Many websites and tools make use of this mechanism and, combined with DNS and WHOIS information, are able to provide detailed or sensitive information like usernames, vulnerabilities, present files or network topology about a system without targeting it directly.&amp;lt;br/&amp;gt;&lt;br /&gt;
Restricting crawlers to access a system can act as a first line of defence and reduce exposure and risks.&amp;lt;br/&amp;gt;   &lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Second presentation:''' VAC Cross-site scripting by Martin Visser. &amp;lt;br/&amp;gt;&lt;br /&gt;
The second VAC on an OWASP meeting was about Cross-site scripting also known as XSS. XSS vulnerabilities are often misunderstood and underestimated but facts show that XSS vulnerability abusing attacks are nowadys the fastest growing and most widespread type of exploit. In short XSS vulnerabilities allow for user input to be executed when containing javascript or HTML code. When combined with other vulnerabilities the possibilities of these attacks are vitually limitless.&amp;lt;br/&amp;gt;&lt;br /&gt;
The only way to prevent these attacks is to sanitize all input and output fields, but this can be more difficult than it appears to be. Simply blacklisting fragments like &amp;lt;script&amp;gt; is not sufficient due to the possibility of recursivity (e.g. &amp;lt;scr&amp;lt;script&amp;gt;ipt&amp;gt;) and encoding (e.g. URL encoding: %3C%73%63%72%69%70%74%3E). Using multiple layers of filters on various places is the only way to assure enough protection against these types of attacks.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
'''Third presentation:''' Beveiligingsaspecten van webapplicatie-ontwikkeling by Wouter van Kuipers. &amp;lt;br/&amp;gt;&lt;br /&gt;
The third presentation of the evening was about the efficiency of a source code analyer for php based websites. Approximately 33% of all websites use php and this can be explained by the low learning curve and ease of use of the language. Due to the low learning curve many php developers have little experience with programming and almost no awareness regading security resulting in many unsecure websites. Source code analysis can help preventing many security issues, but their usage does have some limitations. Firstly the scan on itself takes only a few minutes, but analysing the results requires much longer and depends greatly on how familiar the analyser is with the scanned source code. Second these analysers produce many flase positives, making analysis even more time consuming. Lastly not all vulnerabilities are detected with the same efficiency. Especially vulnerabilities that are dependent on the application logic like injection or XSS are not always efficiently detected.&amp;lt;br/&amp;gt;&lt;br /&gt;
Concluding, like all tools, a source code analyser can be a powerful tool, but one has to be aware of its limitations. These tools can provide results very fast, but when used on unfamiliar code the analysis can be very time consuming.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Scheduled OWASP NL Chapter Meetings: ==&lt;br /&gt;
=== Meeting Schedule May 28th 2009: AppSec Europe 2009 ===&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
The main goal of the upcoming OWASP-NL meeting is to provide an abstract of the recently held AppSec Europe 2009, a VAC about CSRF and, new, an open discussion on application security subjects brought forward by the attendees. &lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
ASR Nederland&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
MD0.60 - Auditorium&amp;lt;br/&amp;gt;&lt;br /&gt;
Smallepad 30&amp;lt;br/&amp;gt;&lt;br /&gt;
3811MG Amersfoort&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:ASR Nederland logo.jpg|200px]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.45 - 19.45 AppSec-EU 2009  (Sebastien Deleersnyder, Telindus) '''&amp;lt;br&amp;gt;&lt;br /&gt;
Update on the AppSec-EU 2009: &amp;lt;br&amp;gt;&lt;br /&gt;
OWASP State of the union, an update on OWASP and OWASP projects and of course the highlights of the AppSec-EU 2009 presentations.&lt;br /&gt;
&lt;br /&gt;
'''19.45 - 20.00 Break '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.30 VAC Cross-Site Request Forgery (Niels Teusink, Fox-IT) '''  ([[Media:20090409_VAC-CSRF-Niels_Teusink.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.&lt;br /&gt;
&lt;br /&gt;
Niels Teusink holds a bachelor degree in Computer Science and has been experimenting with IT security for over a decade. He has worked for Fox-IT since 2005; first as a software engineer and since 2007 as a penetration tester. He has since performed dozens of penetration tests for all sorts of companies, including governments, banks and nuclear installations.&lt;br /&gt;
&lt;br /&gt;
'''20.30 - 21.15 Open session / discussion  (Martin Knobloch/Ferdinand Vroom/Peter Gouwentak) ''' &amp;lt;br&amp;gt;&lt;br /&gt;
Open session / discussion about subjects brought forward by the attendees.&lt;br /&gt;
&lt;br /&gt;
The Announcement of this meeting: [[Media:Announcement OWASP-NL May 28th 2009.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
The flyer of this meeting: [[Media:owasp_NL_may2009.pdf]]&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
=== Meeting Schedule 9th April Knowing Your Enemy ===&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions. &lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
Lange Dreef 17&amp;lt;br/&amp;gt;&lt;br /&gt;
4131 NJ Vianen&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Sogeti_Nederland_b_v_Logo.jpg|http:\\www.sogeti.nl]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
About Sogeti Nederland B.V.&lt;br /&gt;
Sogeti Nederland B.V. is one of top-5 IT companies of the Netherlands. Our workforce of over 3,500 employees provides top quality IT consultancy and services to leading companies in several industry sectors in the Netherlands. Our focus is local, but we are part of Sogeti Worldwide, offering IT services in the American, German, French, Belgian, UK, Swedish, Swiss and Spanish markets. &lt;br /&gt;
&lt;br /&gt;
Our core business is the design, construction, deployment, testing and maintenance of IT solutions. We stand for quality and IT skills; this is visible in our service and in the methods developed by us such as DYA®, Regatta®, TMap®, TPI® , Inframe®, and TEmb. &lt;br /&gt;
&lt;br /&gt;
Vision&lt;br /&gt;
Sogeti delivers value by aligning the results of her services to the strategic goals of the client, thereby committing herself to the success of the client. We prove our commitment by assuming responsibility in various forms and to various degrees.  &lt;br /&gt;
&lt;br /&gt;
New trends&lt;br /&gt;
Our own research institute ViNT (Institute for Research into New Technology) keeps us and our clients ahead of the newest technology trends and their potential influence, benefits and risks.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
More information about Sogeti can be found on our website www.sogeti.nl.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt;&lt;br /&gt;
'''18.45 - 19.30 Modern information gathering; how to abuse search engines             Dave van Stein '''([[Media:20090409_passsive_reconnaissance-Dave_van_Stein.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Great generals already know the key to success is &amp;quot;knowing your enemy&amp;quot;. In hacking terms this is called information gathering, fingerprinting or reconnaissance. Traditionally this phase consisted of using public records like WHOIS and DNS combined with active scans on servers. With the rise of advanced search engines like Yahoo, Live Search and Google a whole new type of reconnaissance has come to life; passive reconnaissance. Often servers are not properly configured which causes lots of valuable information to become available without accessing the server at all. Recently several hacker-tools appeared which use the full capabilities of these search engines giving hackers a head-start at mapping the network they plan to attack. The goal of this session is to give insight in the methods and tools hackers have at their disposal to gather information about systems they plan to attack without accessing the system itself. &lt;br /&gt;
Dave van Stein has close to 8 years of experience in software testing. Since the beginning of 2008 he's working for ps_testware as a web application security testing specialist. &lt;br /&gt;
&lt;br /&gt;
'''19.30 - 20.00 VAC Cross-site scripting      Martin Visser '''([[Media:20090409_VAC_Cross-site-scripting_Martin_Visser.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Martin Visser is a software designer with Sogeti Nederland B.V. specialized in secure application development with Microsoft technologies. He has experience with Microsoft server technologies like ASP.NET, SharePoint and Biztalk. Martin also developed and teaches a 2-day &amp;quot;Application Security - Microsoft development&amp;quot; course both within and outside Sogeti. &lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.15 Break ''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''20.15 - 21.00 Beveiligingsaspecten van webapplicatie-ontwikkeling Wouter van Kuipers ''' ([[Media:20090409_presentatie_Wouter_van_Kuipers.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Het ontwikkelen van webapplicaties verschilt op verschillende aspecten met het ontwikkelen van desktop applicaties, met name op het gebied van security. Voor grote bedrijven zijn er oplossingen beschikbaar als bijvoorbeeld SDL, maar voor het midden- en kleinbedrijf zijn dit soort oplossingen beperkt, omdat zij vaak niet de middelen hebben om dergelijke strategieën uit te kunnen voeren.  Voor zijn scriptie heeft Wouter van Kuipers middels een literatuuronderzoek, interviews met ontwikkelaars en een onderzoek naar Fortify 360 gekeken hoe het midden- en kleinbedrijf omgaat met deze verschillen en hoe zij het ontwikkelproces kunnen optimaliseren op het gebied van security.&lt;br /&gt;
&lt;br /&gt;
Na een MBO opleiding in de IT is Wouter van Kuipers via de HBO opleiding 'Communicatie Systemen' begin 2007 begonnen met een master&lt;br /&gt;
Informatiekunde aan de Radboud Universiteit Nijmegen, welke hij in maart dit jaar hoopt af te ronden. Tijdens zijn MBO studie is zijn interesse in het ontwikkelen van webapplicaties gewekt, wat in 2003 resulteerde in het opzetten van een eigen web-development bedrijf. Dit bedrijf is met name gespecialiseerd in het ontwikkelen van webapplicaties op maat, en het ondersteunen van bedrijven op het gebied van web-developement op freelance basis.&lt;br /&gt;
&lt;br /&gt;
The flyer of this meeting: [[Media:owasp_NL_april2009.pdf]]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2008|2008]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2007|2007]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2006|2006]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2005|2005]]&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_Mini_Meeting_2009&amp;diff=63930</id>
		<title>Netherlands Mini Meeting 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_Mini_Meeting_2009&amp;diff=63930"/>
				<updated>2009-06-09T07:56:23Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Added total persons at minimeet 25-june-09&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Netherlands]] Calendar and Topics for OWASP NL Mini Meetings:&lt;br /&gt;
The 'Mini Meetings' are a informal platform to discus on a specific topic in a small group.&lt;br /&gt;
Chair is, whoever put's in a topic. You will get all support by the OWASP NL Chapter Board!&lt;br /&gt;
Those meetings must result in meeting notes and can result in a presentation on a OWASP NL Chapter meeting!&lt;br /&gt;
&lt;br /&gt;
== Mini Meeting Topics 2009 ==&lt;br /&gt;
&lt;br /&gt;
Topics addressed at the open discussion on the May 28th meeting:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Quickscans and other timeboxed test approaches (discussion)&lt;br /&gt;
Contact      : Barry van Kampen, owasp@itq.nl&lt;br /&gt;
----------&lt;br /&gt;
Date         : 25th june 2009&lt;br /&gt;
Time         : 18:00 Dinner (free of charge), 19:00 Start of discussion, Till ca 21:30&lt;br /&gt;
Location     : ITQ Consultancy&lt;br /&gt;
               Joop Geesinkweg 701 &lt;br /&gt;
               1096 AZ Amsterdam&lt;br /&gt;
Details      : This discussion will be about the way quickscans can be performed.&lt;br /&gt;
               At least basic web application testing knowledge is needed for this session.&lt;br /&gt;
               Please send an email if you would like to attend.&lt;br /&gt;
Total persons: 6 are attending, max 8 in total.&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : SAMM, ASVS and other methodologies&lt;br /&gt;
Contact      : Martin Knobloch&lt;br /&gt;
----------&lt;br /&gt;
Date         : 23rd July 2009&lt;br /&gt;
Time         : 18:00 (dinner provided) to 21:30 &lt;br /&gt;
Location     : Sogeti Nederland B.V.&lt;br /&gt;
               Plotterweg 31-33&lt;br /&gt;
               3821 BB Amersfoort&lt;br /&gt;
Details      : About ideas and experiences of using, implementing and verifying the different methodologies&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Tools of the trade; exchange real-life experiences&lt;br /&gt;
Contact      : Dave van Stein&lt;br /&gt;
----------&lt;br /&gt;
Date         : 27th August 2009&lt;br /&gt;
Time         : 18:00 (sandwiches provided) to 21:30&lt;br /&gt;
Location     : ps_testware&lt;br /&gt;
               Dorpsstraat 26&lt;br /&gt;
               3941 JM Doorn&lt;br /&gt;
Details      : Exchange real-world experience about web testing tools. What is really useable and what is not.&lt;br /&gt;
Attendees    : Max 8 persons, currently 2 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Web Application Firewalls&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Add your own suggestions below:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : suggest a topic&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Mini Meeting minutes ==&lt;br /&gt;
Space below is mend to put the Mini-Meeting-Note!&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to attend, please send an email to the contact of the topic.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
All OWASP chapter meetings are free of charge and you don’t have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_Mini_Meeting_2009&amp;diff=63632</id>
		<title>Netherlands Mini Meeting 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_Mini_Meeting_2009&amp;diff=63632"/>
				<updated>2009-06-05T07:52:03Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Corrected a typo&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Netherlands]] Calendar and Topics for OWASP NL Mini Meetings:&lt;br /&gt;
The 'Mini Meetings' are a informal platform to discus on a specific topic in a small group.&lt;br /&gt;
Chair is, whoever put's in a topic. You will get all support by the OWASP NL Chapter Board!&lt;br /&gt;
Those meetings must result in meeting notes and can result in a presentation on a OWASP NL Chapter meeting!&lt;br /&gt;
&lt;br /&gt;
== Mini Meeting Topics 2009 ==&lt;br /&gt;
&lt;br /&gt;
Topics addressed at the open discussion on the May 28th meeting:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Quickscans and other timeboxed test approaches (discussion)&lt;br /&gt;
Contact      : Barry van Kampen, owasp@itq.nl&lt;br /&gt;
----------&lt;br /&gt;
Date         : 25th june 2009&lt;br /&gt;
Time         : 18:00 Dinner (free of charge), 19:00 Start of discussion, Till ca 21:30&lt;br /&gt;
Location     : ITQ Consultancy&lt;br /&gt;
               Joop Geesinkweg 701 &lt;br /&gt;
               1096 AZ Amsterdam&lt;br /&gt;
Details      : This discussion will be about the way quickscans can be performed.&lt;br /&gt;
               At least basic web application testing knowledge is needed for this session.&lt;br /&gt;
               Max 8 persons in total, please send an email if you would like to attend &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Tools of the trade; exchange real-life experiences&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Web Application Firewalls&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : SAMM, ASVS and other methodologies&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Add your own suggestions below:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : suggest a topic&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Mini Meeting minutes ==&lt;br /&gt;
Space below is mend to put the Mini-Meeting-Note!&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to attend, please send an email to the contact of the topic.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
All OWASP chapter meetings are free of charge and you don’t have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_Mini_Meeting_2009&amp;diff=63585</id>
		<title>Netherlands Mini Meeting 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_Mini_Meeting_2009&amp;diff=63585"/>
				<updated>2009-06-04T06:47:00Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Added details quickscan minimeeting&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Netherlands]] Calendar and Topics for OWASP NL Mini Meetings:&lt;br /&gt;
The 'Mini Meetings' are a informal platform to discus on a specific topic in a small group.&lt;br /&gt;
Chair is, whoever put's in a topic. You will get all support by the OWASP NL Chapter Board!&lt;br /&gt;
Those meetings must result in meeting notes and can result in a presentation on a OWASP NL Chapter meeting!&lt;br /&gt;
&lt;br /&gt;
== Mini Meeting Topics 2009 ==&lt;br /&gt;
&lt;br /&gt;
Topics addressed at the open discussion on the May 28th meeting:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Quickscans and other timeboxed test approaches (discussion)&lt;br /&gt;
Contact      : Barry van Kampen, owasp@itq.nl&lt;br /&gt;
----------&lt;br /&gt;
Date         : 25th june 2009&lt;br /&gt;
Time         : 18:00 Diner (free of charge), 19:00 Start of discussion, Till ca 21:30&lt;br /&gt;
Location     : ITQ Consultancy&lt;br /&gt;
               Joop Geesinkweg 701 &lt;br /&gt;
               1096 AZ Amsterdam&lt;br /&gt;
Details      : This discussion will be about the way quickscans can be performed.&lt;br /&gt;
               At least basic web application testing knowledge is needed for this session.&lt;br /&gt;
               Max 8 persons in total, please send an email if you would like to attend &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Tools of the trade; exchange real-life experiences&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Web Application Firewalls&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : SAMM, ASVS and other methodologies&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Add your own suggestions below:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : suggest a topic&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Mini Meeting minutes ==&lt;br /&gt;
Space below is mend to put the Mini-Meeting-Note!&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to attend, please send an email to the contact of the topic.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
All OWASP chapter meetings are free of charge and you don’t have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands_Mini_Meeting_2009&amp;diff=63570</id>
		<title>Netherlands Mini Meeting 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands_Mini_Meeting_2009&amp;diff=63570"/>
				<updated>2009-06-03T17:02:20Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Filled quickscan details&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Netherlands]] Calendar and Topics for OWASP NL Mini Meetings:&lt;br /&gt;
The 'Mini Meetings' are a informal platform to discus on a specific topic in a small group.&lt;br /&gt;
Chair is, whoever put's in a topic. You will get all support by the OWASP NL Chapter Board!&lt;br /&gt;
Those meetings must result in meeting notes and can result in a presentation on a OWASP NL Chapter meeting!&lt;br /&gt;
&lt;br /&gt;
== Mini Meeting Topics 2009 ==&lt;br /&gt;
&lt;br /&gt;
Topics addressed at the open discussion on the May 28th meeting:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Discussion about Quickscans and other timeboxed test approaches&lt;br /&gt;
Contact      : Barry van Kampen (email will follow soon)&lt;br /&gt;
----------&lt;br /&gt;
Date         : 25th june 2009&lt;br /&gt;
Time         : 18:00 Diner (free of charge), 19:00 Start of discussion, Till ca 21:30&lt;br /&gt;
Location     : Amsterdam (Amstel business park), ITQ office&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Tools of the trade; exchange real-life experiences&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : Web Application Firewalls&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : SAMM, ASVS and other methodologies&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Add your own suggestions below:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
Topic        : suggest a topic&lt;br /&gt;
Contact      : put in your contact details&lt;br /&gt;
----------&lt;br /&gt;
Date         : suggest a date&lt;br /&gt;
Time         : suggest a time&lt;br /&gt;
Location     : suggest a location&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Mini Meeting minutes ==&lt;br /&gt;
Space below is mend to put the Mini-Meeting-Note!&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br/&amp;gt;&lt;br /&gt;
If you want to attend, please send an email to the contact of the topic.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
All OWASP chapter meetings are free of charge and you don’t have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=61732</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=61732"/>
				<updated>2009-05-25T08:35:13Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Removed spam link: http://www.textaltadarli.com&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=The chapter leader is [mailto:owasp@irc2.nl Bert Koelewijn]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}}&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers ===&lt;br /&gt;
We are continuously looking for speakers and presentations make the chapter meetings as interesting as possible. Therefore we are looking inside and outside OWASP for known international specialists. But we know, there is a lot interesting stuf happening inside the Netherlands, too!  &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presentations:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Are you working on interesting subject, you would like to share your experiences with the OWASP community.&lt;br /&gt;
Any topic related to application security will be appreciated!&amp;lt;br/&amp;gt;&lt;br /&gt;
'''VAC, Vulnerability, Attack, Countermeasure:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
The goal is an half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sponsorship of a local chapter meeting ===&lt;br /&gt;
We are continuously looking for locations to hold local chapter meetings. Therefore, we need companies willing to sponsor of host events.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Hosting a local chapter meeting:'''&amp;lt;br&amp;gt;&lt;br /&gt;
To host a local chapter meeting, you facilitate the meeting location and beverage for the attendees&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsorship of a local chapter meeting:'''&amp;lt;br&amp;gt;&lt;br /&gt;
You cover the cost of renting the location for the meeting and the payment of the beverages for the attendees&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Please let us know via the OWASP chapter meeting questionnaire of via email to martin.knobloch@owasp.org&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Meeting schedule 2009 ==&lt;br /&gt;
This is an overview of the 2009 local chapter meeting schedule. Details of the meetings can be found in the announcements that will be posted below this schedule.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
April 9th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 18.00 - 21.30&lt;br /&gt;
Main Topic   : Knowing Your Enemy&lt;br /&gt;
Presentations: Modern information gathering; how to abuse search engines         Dave van Stein&lt;br /&gt;
               VAC Cross-site scripting                                          Martin Visser &lt;br /&gt;
               Beveiligingsaspecten van webapplicatie-ontwikkeling               Wouter van Kuipers &lt;br /&gt;
Location     : Lange Dreef 17&lt;br /&gt;
               4131 NJ Vianen&lt;br /&gt;
Sponsor      : Sogeti Nederland B.V.&lt;br /&gt;
&lt;br /&gt;
May 28th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 18.00 - 21.30&lt;br /&gt;
Main Topic   : AppSec Europe 2009&lt;br /&gt;
Presentations: AppSec-EU 2009                                                    Sebastien Deleersnyder, Telindus &lt;br /&gt;
               VAC Cross-Site Request Forgery                                    Niels Teusink&lt;br /&gt;
               Open session / discussion about subjects brought forward by &lt;br /&gt;
               the attendees                                                     Martin Knobloch/Ferdinand Vroom/Peter Gouwentak&lt;br /&gt;
Location     : ASR Nederland&lt;br /&gt;
               MD0.60 - Auditorium&lt;br /&gt;
               Smallepad 30&lt;br /&gt;
               3811MG Amersfoort&lt;br /&gt;
Sponsor      : ASR Nederland&lt;br /&gt;
&lt;br /&gt;
September 24th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&lt;br /&gt;
December 10th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br&amp;gt;&lt;br /&gt;
If you want to attend, please send an email to: bert.koelewijn@owasp.org&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
All OWASP chapter meetings are free of charge and you don't have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
NOTE TO CISSP's: OWASP Meetings count towards CPE Credits.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Schedule May 28th 2009: AppSec Europe 2009 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
The main goal of the upcoming OWASP-NL meeting is to provide an abstract of the recently held AppSec Europe 2009, a VAC about CSRF and, new, an open discussion on application security subjects brought forward by the attendees. &lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
ASR Nederland&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
MD0.60 - Auditorium&amp;lt;br/&amp;gt;&lt;br /&gt;
Smallepad 30&amp;lt;br/&amp;gt;&lt;br /&gt;
3811MG Amersfoort&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:ASR Nederland logo.jpg|200px]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.45 - 19.45 AppSec-EU 2009  (Sebastien Deleersnyder, Telindus) '''&amp;lt;br&amp;gt;&lt;br /&gt;
Update on the AppSec-EU 2009: &amp;lt;br&amp;gt;&lt;br /&gt;
OWASP State of the union, an update on OWASP and OWASP projects and of course the highlights of the AppSec-EU 2009 presentations.&lt;br /&gt;
&lt;br /&gt;
'''19.45 - 20.00 Break '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.30 VAC Cross-Site Request Forgery (Niels Teusink, Fox-IT) ''' &amp;lt;br&amp;gt;&lt;br /&gt;
CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.&lt;br /&gt;
&lt;br /&gt;
Niels Teusink holds a bachelor degree in Computer Science and has been experimenting with IT security for over a decade. He has worked for Fox-IT since 2005; first as a software engineer and since 2007 as a penetration tester. He has since performed dozens of penetration tests for all sorts of companies, including governments, banks and nuclear installations.&lt;br /&gt;
&lt;br /&gt;
'''20.30 - 21.15 Open session / discussion  (Martin Knobloch/Ferdinand Vroom/Peter Gouwentak) ''' &amp;lt;br&amp;gt;&lt;br /&gt;
Open session / discussion about subjects brought forward by the attendees.&lt;br /&gt;
&lt;br /&gt;
The Announcement of this meeting: [[Media:Announcement OWASP-NL May 28th 2009.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
The flyer of this meeting: [[Media:owasp_NL_may2009.pdf]]&lt;br /&gt;
&lt;br /&gt;
== Meeting Schedule 9th April Knowing Your Enemy ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions. &lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
Lange Dreef 17&amp;lt;br/&amp;gt;&lt;br /&gt;
4131 NJ Vianen&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Sogeti_Nederland_b_v_Logo.jpg|http:\\www.sogeti.nl]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
About Sogeti Nederland B.V.&lt;br /&gt;
Sogeti Nederland B.V. is one of top-5 IT companies of the Netherlands. Our workforce of over 3,500 employees provides top quality IT consultancy and services to leading companies in several industry sectors in the Netherlands. Our focus is local, but we are part of Sogeti Worldwide, offering IT services in the American, German, French, Belgian, UK, Swedish, Swiss and Spanish markets. &lt;br /&gt;
&lt;br /&gt;
Our core business is the design, construction, deployment, testing and maintenance of IT solutions. We stand for quality and IT skills; this is visible in our service and in the methods developed by us such as DYAÂ®, RegattaÂ®, TMapÂ®, TPIÂ® , InframeÂ®, and TEmb. &lt;br /&gt;
&lt;br /&gt;
Vision&lt;br /&gt;
Sogeti delivers value by aligning the results of her services to the strategic goals of the client, thereby committing herself to the success of the client. We prove our commitment by assuming responsibility in various forms and to various degrees.  &lt;br /&gt;
&lt;br /&gt;
New trends&lt;br /&gt;
Our own research institute ViNT (Institute for Research into New Technology) keeps us and our clients ahead of the newest technology trends and their potential influence, benefits and risks.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
More information about Sogeti can be found on our website www.sogeti.nl.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.30 â 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt;&lt;br /&gt;
'''18.45 - 19.30 Modern information gathering; how to abuse search engines             Dave van Stein '''([[Media:20090409_passsive_reconnaissance_Dave_van_Stein.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Great generals already know the key to success is &amp;quot;knowing your enemy&amp;quot;. In hacking terms this is called information gathering, fingerprinting or reconnaissance. Traditionally this phase consisted of using public records like WHOIS and DNS combined with active scans on servers. With the rise of advanced search engines like Yahoo, Live Search and Google a whole new type of reconnaissance has come to life; passive reconnaissance. Often servers are not properly configured which causes lots of valuable information to become available without accessing the server at all. Recently several hacker-tools appeared which use the full capabilities of these search engines giving hackers a head-start at mapping the network they plan to attack. The goal of this session is to give insight in the methods and tools hackers have at their disposal to gather information about systems they plan to attack without accessing the system itself. &lt;br /&gt;
Dave van Stein has close to 8 years of experience in software testing. Since the beginning of 2008 he's working for ps_testware as a web application security testing specialist. &lt;br /&gt;
&lt;br /&gt;
'''19.30 - 20.00 VAC Cross-site scripting      Martin Visser '''([[Media:20090409_VAC_Cross-site-scripting_Martin_Visser.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Martin Visser is a software designer with Sogeti Nederland B.V. specialized in secure application development with Microsoft technologies. He has experience with Microsoft server technologies like ASP.NET, SharePoint and Biztalk. Martin also developed and teaches a 2-day &amp;quot;Application Security â Microsoft development&amp;quot; course both within and outside Sogeti. &lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.15 Break ''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''20.15 - 21.00 Beveiligingsaspecten van webapplicatie-ontwikkeling Wouter van Kuipers ''' ([[Media:20090409_presentatie_Wouter_van_Kuipers.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Het ontwikkelen van webapplicaties verschilt op verschillende aspecten met het ontwikkelen van desktop applicaties, met name op het gebied van security. Voor grote bedrijven zijn er oplossingen beschikbaar als bijvoorbeeld SDL, maar voor het midden- en kleinbedrijf zijn dit soort oplossingen beperkt, omdat zij vaak niet de middelen hebben om dergelijke strategieÃ«n uit te kunnen voeren.  Voor zijn scriptie heeft Wouter van Kuipers middels een literatuuronderzoek, interviews met ontwikkelaars en een onderzoek naar Fortify 360 gekeken hoe het midden- en kleinbedrijf omgaat met deze verschillen en hoe zij het ontwikkelproces kunnen optimaliseren op het gebied van security.&lt;br /&gt;
&lt;br /&gt;
Na een MBO opleiding in de IT is Wouter van Kuipers via de HBO opleiding 'Communicatie Systemen' begin 2007 begonnen met een master&lt;br /&gt;
Informatiekunde aan de Radboud Universiteit Nijmegen, welke hij in maart dit jaar hoopt af te ronden. Tijdens zijn MBO studie is zijn interesse in het ontwikkelen van webapplicaties gewekt, wat in 2003 resulteerde in het opzetten van een eigen web-development bedrijf. Dit bedrijf is met name gespecialiseerd in het ontwikkelen van webapplicaties op maat, en het ondersteunen van bedrijven op het gebied van web-developement op freelance basis.&lt;br /&gt;
&lt;br /&gt;
The flyer of this meeting: [[Media:owasp_NL_april2009.pdf]]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2008|2008]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2007|2007]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2006|2006]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2005|2005]]&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=61731</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=61731"/>
				<updated>2009-05-25T08:33:02Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Removed &amp;quot;&amp;quot; like characters and added the flyer for may 2009&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;http://www.textaltadarli.com &lt;br /&gt;
{{Chapter Template|chaptername=Netherlands|extra=The chapter leader is [mailto:owasp@irc2.nl Bert Koelewijn]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}}&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers ===&lt;br /&gt;
We are continuously looking for speakers and presentations make the chapter meetings as interesting as possible. Therefore we are looking inside and outside OWASP for known international specialists. But we know, there is a lot interesting stuf happening inside the Netherlands, too!  &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presentations:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Are you working on interesting subject, you would like to share your experiences with the OWASP community.&lt;br /&gt;
Any topic related to application security will be appreciated!&amp;lt;br/&amp;gt;&lt;br /&gt;
'''VAC, Vulnerability, Attack, Countermeasure:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
The goal is an half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sponsorship of a local chapter meeting ===&lt;br /&gt;
We are continuously looking for locations to hold local chapter meetings. Therefore, we need companies willing to sponsor of host events.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Hosting a local chapter meeting:'''&amp;lt;br&amp;gt;&lt;br /&gt;
To host a local chapter meeting, you facilitate the meeting location and beverage for the attendees&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsorship of a local chapter meeting:'''&amp;lt;br&amp;gt;&lt;br /&gt;
You cover the cost of renting the location for the meeting and the payment of the beverages for the attendees&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Please let us know via the OWASP chapter meeting questionnaire of via email to martin.knobloch@owasp.org&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Meeting schedule 2009 ==&lt;br /&gt;
This is an overview of the 2009 local chapter meeting schedule. Details of the meetings can be found in the announcements that will be posted below this schedule.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
April 9th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 18.00 - 21.30&lt;br /&gt;
Main Topic   : Knowing Your Enemy&lt;br /&gt;
Presentations: Modern information gathering; how to abuse search engines         Dave van Stein&lt;br /&gt;
               VAC Cross-site scripting                                          Martin Visser &lt;br /&gt;
               Beveiligingsaspecten van webapplicatie-ontwikkeling               Wouter van Kuipers &lt;br /&gt;
Location     : Lange Dreef 17&lt;br /&gt;
               4131 NJ Vianen&lt;br /&gt;
Sponsor      : Sogeti Nederland B.V.&lt;br /&gt;
&lt;br /&gt;
May 28th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 18.00 - 21.30&lt;br /&gt;
Main Topic   : AppSec Europe 2009&lt;br /&gt;
Presentations: AppSec-EU 2009                                                    Sebastien Deleersnyder, Telindus &lt;br /&gt;
               VAC Cross-Site Request Forgery                                    Niels Teusink&lt;br /&gt;
               Open session / discussion about subjects brought forward by &lt;br /&gt;
               the attendees                                                     Martin Knobloch/Ferdinand Vroom/Peter Gouwentak&lt;br /&gt;
Location     : ASR Nederland&lt;br /&gt;
               MD0.60 - Auditorium&lt;br /&gt;
               Smallepad 30&lt;br /&gt;
               3811MG Amersfoort&lt;br /&gt;
Sponsor      : ASR Nederland&lt;br /&gt;
&lt;br /&gt;
September 24th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&lt;br /&gt;
December 10th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br&amp;gt;&lt;br /&gt;
If you want to attend, please send an email to: bert.koelewijn@owasp.org&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
All OWASP chapter meetings are free of charge and you don't have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
NOTE TO CISSP's: OWASP Meetings count towards CPE Credits.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Schedule May 28th 2009: AppSec Europe 2009 ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
The main goal of the upcoming OWASP-NL meeting is to provide an abstract of the recently held AppSec Europe 2009, a VAC about CSRF and, new, an open discussion on application security subjects brought forward by the attendees. &lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
ASR Nederland&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
MD0.60 - Auditorium&amp;lt;br/&amp;gt;&lt;br /&gt;
Smallepad 30&amp;lt;br/&amp;gt;&lt;br /&gt;
3811MG Amersfoort&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:ASR Nederland logo.jpg|200px]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.30 - 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.45 - 19.45 AppSec-EU 2009  (Sebastien Deleersnyder, Telindus) '''&amp;lt;br&amp;gt;&lt;br /&gt;
Update on the AppSec-EU 2009: &amp;lt;br&amp;gt;&lt;br /&gt;
OWASP State of the union, an update on OWASP and OWASP projects and of course the highlights of the AppSec-EU 2009 presentations.&lt;br /&gt;
&lt;br /&gt;
'''19.45 - 20.00 Break '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.30 VAC Cross-Site Request Forgery (Niels Teusink, Fox-IT) ''' &amp;lt;br&amp;gt;&lt;br /&gt;
CSRF is an attack which forces an end user to execute unwanted actions on a web application in which he/she is currently authenticated. With a little help of social engineering (like sending a link via email/chat), an attacker may force the users of a web application to execute actions of the attacker's choosing. A successful CSRF exploit can compromise end user data and operation in case of normal user. If the targeted end user is the administrator account, this can compromise the entire web application.&lt;br /&gt;
&lt;br /&gt;
Niels Teusink holds a bachelor degree in Computer Science and has been experimenting with IT security for over a decade. He has worked for Fox-IT since 2005; first as a software engineer and since 2007 as a penetration tester. He has since performed dozens of penetration tests for all sorts of companies, including governments, banks and nuclear installations.&lt;br /&gt;
&lt;br /&gt;
'''20.30 - 21.15 Open session / discussion  (Martin Knobloch/Ferdinand Vroom/Peter Gouwentak) ''' &amp;lt;br&amp;gt;&lt;br /&gt;
Open session / discussion about subjects brought forward by the attendees.&lt;br /&gt;
&lt;br /&gt;
The Announcement of this meeting: [[Media:Announcement OWASP-NL May 28th 2009.pdf]]&amp;lt;br&amp;gt;&lt;br /&gt;
The flyer of this meeting: [[Media:owasp_NL_may2009.pdf]]&lt;br /&gt;
&lt;br /&gt;
== Meeting Schedule 9th April Knowing Your Enemy ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions. &lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
Lange Dreef 17&amp;lt;br/&amp;gt;&lt;br /&gt;
4131 NJ Vianen&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Sogeti_Nederland_b_v_Logo.jpg|http:\\www.sogeti.nl]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
About Sogeti Nederland B.V.&lt;br /&gt;
Sogeti Nederland B.V. is one of top-5 IT companies of the Netherlands. Our workforce of over 3,500 employees provides top quality IT consultancy and services to leading companies in several industry sectors in the Netherlands. Our focus is local, but we are part of Sogeti Worldwide, offering IT services in the American, German, French, Belgian, UK, Swedish, Swiss and Spanish markets. &lt;br /&gt;
&lt;br /&gt;
Our core business is the design, construction, deployment, testing and maintenance of IT solutions. We stand for quality and IT skills; this is visible in our service and in the methods developed by us such as DYAÂ®, RegattaÂ®, TMapÂ®, TPIÂ® , InframeÂ®, and TEmb. &lt;br /&gt;
&lt;br /&gt;
Vision&lt;br /&gt;
Sogeti delivers value by aligning the results of her services to the strategic goals of the client, thereby committing herself to the success of the client. We prove our commitment by assuming responsibility in various forms and to various degrees.  &lt;br /&gt;
&lt;br /&gt;
New trends&lt;br /&gt;
Our own research institute ViNT (Institute for Research into New Technology) keeps us and our clients ahead of the newest technology trends and their potential influence, benefits and risks.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
More information about Sogeti can be found on our website www.sogeti.nl.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.30 â 18.45 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt;&lt;br /&gt;
'''18.45 - 19.30 Modern information gathering; how to abuse search engines             Dave van Stein '''([[Media:20090409_passsive_reconnaissance_Dave_van_Stein.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Great generals already know the key to success is &amp;quot;knowing your enemy&amp;quot;. In hacking terms this is called information gathering, fingerprinting or reconnaissance. Traditionally this phase consisted of using public records like WHOIS and DNS combined with active scans on servers. With the rise of advanced search engines like Yahoo, Live Search and Google a whole new type of reconnaissance has come to life; passive reconnaissance. Often servers are not properly configured which causes lots of valuable information to become available without accessing the server at all. Recently several hacker-tools appeared which use the full capabilities of these search engines giving hackers a head-start at mapping the network they plan to attack. The goal of this session is to give insight in the methods and tools hackers have at their disposal to gather information about systems they plan to attack without accessing the system itself. &lt;br /&gt;
Dave van Stein has close to 8 years of experience in software testing. Since the beginning of 2008 he's working for ps_testware as a web application security testing specialist. &lt;br /&gt;
&lt;br /&gt;
'''19.30 - 20.00 VAC Cross-site scripting      Martin Visser '''([[Media:20090409_VAC_Cross-site-scripting_Martin_Visser.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Martin Visser is a software designer with Sogeti Nederland B.V. specialized in secure application development with Microsoft technologies. He has experience with Microsoft server technologies like ASP.NET, SharePoint and Biztalk. Martin also developed and teaches a 2-day &amp;quot;Application Security â Microsoft development&amp;quot; course both within and outside Sogeti. &lt;br /&gt;
&lt;br /&gt;
'''20.00 - 20.15 Break ''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''20.15 - 21.00 Beveiligingsaspecten van webapplicatie-ontwikkeling Wouter van Kuipers ''' ([[Media:20090409_presentatie_Wouter_van_Kuipers.pdf]])&amp;lt;br&amp;gt;&lt;br /&gt;
Het ontwikkelen van webapplicaties verschilt op verschillende aspecten met het ontwikkelen van desktop applicaties, met name op het gebied van security. Voor grote bedrijven zijn er oplossingen beschikbaar als bijvoorbeeld SDL, maar voor het midden- en kleinbedrijf zijn dit soort oplossingen beperkt, omdat zij vaak niet de middelen hebben om dergelijke strategieÃ«n uit te kunnen voeren.  Voor zijn scriptie heeft Wouter van Kuipers middels een literatuuronderzoek, interviews met ontwikkelaars en een onderzoek naar Fortify 360 gekeken hoe het midden- en kleinbedrijf omgaat met deze verschillen en hoe zij het ontwikkelproces kunnen optimaliseren op het gebied van security.&lt;br /&gt;
&lt;br /&gt;
Na een MBO opleiding in de IT is Wouter van Kuipers via de HBO opleiding 'Communicatie Systemen' begin 2007 begonnen met een master&lt;br /&gt;
Informatiekunde aan de Radboud Universiteit Nijmegen, welke hij in maart dit jaar hoopt af te ronden. Tijdens zijn MBO studie is zijn interesse in het ontwikkelen van webapplicaties gewekt, wat in 2003 resulteerde in het opzetten van een eigen web-development bedrijf. Dit bedrijf is met name gespecialiseerd in het ontwikkelen van webapplicaties op maat, en het ondersteunen van bedrijven op het gebied van web-developement op freelance basis.&lt;br /&gt;
&lt;br /&gt;
The flyer of this meeting: [[Media:owasp_NL_april2009.pdf]]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2008|2008]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2007|2007]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2006|2006]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2005|2005]]&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_NL_may2009.pdf&amp;diff=61730</id>
		<title>File:Owasp NL may2009.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_NL_may2009.pdf&amp;diff=61730"/>
				<updated>2009-05-25T08:31:45Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: The flyer of the OWASP Netherlands meeting on the 28th of May 2009&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The flyer of the OWASP Netherlands meeting on the 28th of May 2009&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_NL_april2009.pdf&amp;diff=54878</id>
		<title>File:Owasp NL april2009.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_NL_april2009.pdf&amp;diff=54878"/>
				<updated>2009-02-18T12:04:02Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: uploaded a new version of &amp;quot;Image:Owasp NL april2009.pdf&amp;quot;: Flyer OWASP Meeting April 2009, new version has a correct year in the tittle&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Meeting flyer OWASP Netherlands April 2009&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=54869</id>
		<title>Netherlands</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Netherlands&amp;diff=54869"/>
				<updated>2009-02-18T09:40:53Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: /* Meeting Schedule 9th April Knowing Your Enemy */  Added flyer&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Netherlands|extra=The chapter leader is [mailto:owasp@irc2.nl Bert Koelewijn]&lt;br /&gt;
&amp;lt;paypal&amp;gt;Netherlands&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-netherlands|emailarchives=http://lists.owasp.org/pipermail/owasp-netherlands}}&lt;br /&gt;
&lt;br /&gt;
=== Call for Speakers ===&lt;br /&gt;
We are continuously looking for speakers and presentations make the chapter meetings as interesting as possible. Therefore we are looking inside and outside OWASP for known international specialists. But we know, there is a lot interesting stuf happening inside the Netherlands, too!  &amp;lt;br/&amp;gt;&lt;br /&gt;
'''Presentations:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
Are you working on interesting subject, you would like to share your experiences with the OWASP community.&lt;br /&gt;
Any topic related to application security will be appreciated!&amp;lt;br/&amp;gt;&lt;br /&gt;
'''VAC, Vulnerability, Attack, Countermeasure:'''&amp;lt;br/&amp;gt;&lt;br /&gt;
The goal is an half hour in-depth technical presentation about a vulnerability, how it can be exploited and how to prevent it!&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Sponsorship of a local chapter meeting ===&lt;br /&gt;
We are continuously looking for locations to hold local chapter meetings. Therefore, we need companies willing to sponsor of host events.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Hosting a local chapter meeting:'''&amp;lt;br&amp;gt;&lt;br /&gt;
To host a local chapter meeting, you facilitate the meeting location and beverage for the attendees&amp;lt;br&amp;gt;&lt;br /&gt;
'''Sponsorship of a local chapter meeting:'''&amp;lt;br&amp;gt;&lt;br /&gt;
You cover the cost of renting the location for the meeting and the payment of the beverages for the attendees&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Please let us know via the OWASP chapter meeting questionnaire of via email to martin.knobloch@owasp.org&amp;lt;br&amp;gt;'''&lt;br /&gt;
&lt;br /&gt;
== Meeting schedule 2009 ==&lt;br /&gt;
This is an overview of the 2009 local chapter meeting schedule. Details of the meetings can be found in the announcements that will be posted below this schedule.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
April 9th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : Knowing Your Enemy&lt;br /&gt;
Presentations: Modern information gathering; how to abuse search engines         Dave van Stein &lt;br /&gt;
               VAC Cross-site scripting                                          Martin Visser &lt;br /&gt;
               Beveiligingsaspecten van webapplicatie-ontwikkeling               Wouter van Kuipers &lt;br /&gt;
Location     : Lange Dreef 17, 4131 NJ Vianen&lt;br /&gt;
               088 - 660 66 00&lt;br /&gt;
Sponsor      : Sogeti Nederland B.V.&lt;br /&gt;
&lt;br /&gt;
May 28th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&lt;br /&gt;
September 24th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&lt;br /&gt;
December 10th&lt;br /&gt;
----------&lt;br /&gt;
Time         : 17.30 - 21.30&lt;br /&gt;
Main Topic   : &lt;br /&gt;
Presentations: &lt;br /&gt;
Location     : &lt;br /&gt;
Sponsor      : &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&amp;lt;br&amp;gt;&lt;br /&gt;
If you want to attend, please send an email to: owasp@irc2.com.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
All OWASP chapter meetings are free of charge and you don’t have to be an OWASP member to attend. There are never any vendor pitches or sales presentations at OWASP meetings.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
NOTE TO CISSP's: OWASP Meetings count towards CPE Credits.&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Meeting Schedule 9th April Knowing Your Enemy ==&lt;br /&gt;
&lt;br /&gt;
'''Summary'''&lt;br /&gt;
The main goal of the upcoming OWASP-NL meeting is to provide information to managers, architects, designers, developers and security and risk professionals. The speakers will give specific examples and there will be time to ask questions. &lt;br /&gt;
&amp;lt;table&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
Lange Dreef 17&amp;lt;br/&amp;gt;&lt;br /&gt;
4131 NJ Vianen&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
[[Image:Sogeti_Nederland_b_v_Logo.jpg|http:\\www.sogeti.nl]]&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;350&amp;quot;&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td width=&amp;quot;650&amp;quot;&amp;gt;&lt;br /&gt;
About Sogeti Nederland B.V.&lt;br /&gt;
Sogeti Nederland B.V. is one of top-5 IT companies of the Netherlands. Our workforce of over 3,500 employees provides top quality IT consultancy and services to leading companies in several industry sectors in the Netherlands. Our focus is local, but we are part of Sogeti Worldwide, offering IT services in the American, German, French, Belgian, UK, Swedish, Swiss and Spanish markets. &lt;br /&gt;
&lt;br /&gt;
Our core business is the design, construction, deployment, testing and maintenance of IT solutions. We stand for quality and IT skills; this is visible in our service and in the methods developed by us such as DYA®, Regatta®, TMap®, TPI® , Inframe®, and TEmb. &lt;br /&gt;
&lt;br /&gt;
Vision&lt;br /&gt;
Sogeti delivers value by aligning the results of her services to the strategic goals of the client, thereby committing herself to the success of the client. We prove our commitment by assuming responsibility in various forms and to various degrees.  &lt;br /&gt;
&lt;br /&gt;
New trends&lt;br /&gt;
Our own research institute ViNT (Institute for Research into New Technology) keeps us and our clients ahead of the newest technology trends and their potential influence, benefits and risks.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
More information about Sogeti can be found on our website www.sogeti.nl.&lt;br /&gt;
&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''18.30 – 19:00 Introduction (OWASP organization, projects, sponsor) '''&amp;lt;br&amp;gt;&lt;br /&gt;
'''19.00 - 19.45 Modern information gathering; how to abuse search engines             Dave van Stein '''&amp;lt;br&amp;gt;&lt;br /&gt;
Great generals already know the key to success is &amp;quot;knowing your enemy&amp;quot;. In hacking terms this is called information gathering, fingerprinting or reconnaissance. Traditionally this phase consisted of using public records like WHOIS and DNS combined with active scans on servers. With the rise of advanced search engines like Yahoo, Live Search and Google a whole new type of reconnaissance has come to live; passive reconnaissance. Often servers are not properly configured which causes lots of valuable information to become available without accessing the server at all. Recently several hacker-tools appeared which use the full capabilities of these search engines giving hackers a head-start at mapping the network they plan to attack. The goal of this session is to give insight in the methods and tools hackers have at their disposal to gather information about systems they plan to attack without accessing the system itself. &lt;br /&gt;
Dave van Stein has close to 8 years of experience in software testing. Since the beginning of 2008 he’s working for ps_testware as a web application security testing specialist. &lt;br /&gt;
&lt;br /&gt;
'''19.45 – 20.00 VAC Cross-site scripting      Martin Visser ''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Martin Visser is a software designer with Sogeti Nederland B.V. specialized in secure application development with Microsoft technologies. He has experience with Microsoft server technologies like ASP.NET, SharePoint and Biztalk. Martin also developed and teaches a 2-day &amp;quot;Application Security – Microsoft development&amp;quot; course both within and outside Sogeti. &lt;br /&gt;
&lt;br /&gt;
'''20.00 – 20.15 Break ''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''20.15 – 21.00 Beveiligingsaspecten van webapplicatie-ontwikkeling Wouter van Kuipers '''&amp;lt;br&amp;gt;&lt;br /&gt;
Het ontwikkelen van webapplicaties verschilt op verschillende aspecten met het ontwikkelen van desktop applicaties, met name op het gebied van security. Voor grote bedrijven zijn er oplossingen beschikbaar als bijvoorbeeld SDL, maar voor het midden- en kleinbedrijf zijn dit soort oplossingen beperkt, omdat zij vaak niet de middelen hebben om dergelijke strategieën uit te kunnen voeren.  Voor mijn scriptie heb ik middels een literatuuronderzoek, interviews met ontwikkelaars en een onderzoek naar Fortify 360 gekeken hoe het midden- en kleinbedrijf omgaat met deze verschillen en hoe zij het ontwikkelproces kunnen optimaliseren op het gebied van security. &lt;br /&gt;
&lt;br /&gt;
Na een MBO opleiding in de IT is Wouter Kuipers via de HBO opleiding 'Communicatie Systemen' begin 2007 begonnen met een master&lt;br /&gt;
Informatiekunde aan de Radboud Universiteit Nijmegen, welke hij in maart dit jaar hoopt af te ronden. Tijdens zijn MBO studie is zijn interesse in het ontwikkelen van webapplicaties gewekt, wat in 2003 resulteerde in het opzetten van een eigen web-development bedrijf. Dit bedrijf is met name gespecialiseerd in het ontwikkelen van webapplicaties op maat, en het ondersteunen van bedrijven op het gebied van web-developement op freelance basis.&lt;br /&gt;
&lt;br /&gt;
The flyer of this meeting: [[Media:owasp_NL_april2009.pdf]]&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2008|2008]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2007|2007]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2006|2006]]&lt;br /&gt;
* Events held in [[Netherlands_Previous_Events_2005|2005]]&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp_NL_april2009.pdf&amp;diff=54868</id>
		<title>File:Owasp NL april2009.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp_NL_april2009.pdf&amp;diff=54868"/>
				<updated>2009-02-18T09:40:15Z</updated>
		
		<summary type="html">&lt;p&gt;Bvankampen: Meeting flyer OWASP Netherlands April 2009&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Meeting flyer OWASP Netherlands April 2009&lt;/div&gt;</summary>
		<author><name>Bvankampen</name></author>	</entry>

	</feed>