<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cscott</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Cscott"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Cscott"/>
		<updated>2026-04-12T00:34:17Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=155344</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=155344"/>
				<updated>2013-07-10T22:20:52Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== July 2013 ===&lt;br /&gt;
'''When''': Thursday, July 11, 2013 from 5:30 PM to 8:30 PM (PST) &lt;br /&gt;
&lt;br /&gt;
'''Location''': Room 150, University Hall, UC Berkeley.&lt;br /&gt;
&lt;br /&gt;
The room is to the immediate left after entering the building from&lt;br /&gt;
Addison street at ground level (not basement level).&lt;br /&gt;
&lt;br /&gt;
For driving/public-transit directions, look up:&lt;br /&gt;
2199 Addison St., Berkeley, CA, 94720&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''No RSVP Required'''&lt;br /&gt;
&lt;br /&gt;
Details:&lt;br /&gt;
&lt;br /&gt;
5:30 - 5:45 Social gathering&lt;br /&gt;
&lt;br /&gt;
5:45 - 6:00 Welcome (Cory Scott) / OWASP Update (Sarah Baso)&lt;br /&gt;
&lt;br /&gt;
6:00 - 6:15 An Empirical Study of Vulnerability Rewards Programs, Devdatta Akhawe&lt;br /&gt;
&lt;br /&gt;
6:15 - 7:15 &amp;quot;Putting Your Robots to Work&amp;quot;, Twitter Security Team&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Getting There:&lt;br /&gt;
&lt;br /&gt;
BART:&lt;br /&gt;
The &amp;quot;Downtown Berkeley&amp;quot; BART station is two blocks away.&lt;br /&gt;
&lt;br /&gt;
Parking:&lt;br /&gt;
It's Summer, and metered street parking is available nearby.&lt;br /&gt;
&lt;br /&gt;
Paid off-street parking is also available.  One street south on Center street, the Bank of America lot is cheap but small, and there is a large&lt;br /&gt;
lot on Alston street between Shattuck and Milvia.&lt;br /&gt;
&lt;br /&gt;
== Bay Area Past Events ==&lt;br /&gt;
&lt;br /&gt;
[https://www.owasp.org/index.php/Bay_Area_Past_Events Bay Area Past Events]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Bay Area Chapter Leaders ==&lt;br /&gt;
&lt;br /&gt;
*[mailto:teresa.ann.stevens2009@gmail.com Teresa Stevens] &lt;br /&gt;
*[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122957</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=122957"/>
				<updated>2012-01-19T17:09:59Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== Next Chapter Meeting: January 19th, 2012 ==&lt;br /&gt;
&lt;br /&gt;
The next OWASP Chicago chapter will be on '''January 19th, 2012''' from 6PM to approximately 9:30PM. Space for the meeting is being graciously provided by Morningstar at their [http://maps.google.com/maps?f=q&amp;amp;source=s_q&amp;amp;hl=en&amp;amp;geocode=&amp;amp;q=22+West+Washington+Street+Chicago,+IL+60602&amp;amp;aq=&amp;amp;sll=37.0625,-95.677068&amp;amp;sspn=30.599615,68.554688&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=22+W+Washington+St,+Chicago,+Illinois+60602&amp;amp;z=16 downtown Chicago headquarters location] (22 West Washington Street Chicago, IL 60602). &lt;br /&gt;
&lt;br /&gt;
'''You must RSVP for this event''' by sending an email to [mailto:vitaly.mclain@gmail.com Vitaly McLain]. Please try to include &amp;quot;OWASP&amp;quot; in the subject, and send your name no later than 4PM on January 18th. When you arrive, you will need to sign in with security in the lobby of the building, who will direct you to the cafeteria for refreshments. We will then move to the Auditorium for talks. The meeting is open to everyone and is free to attend!&lt;br /&gt;
&lt;br /&gt;
The schedule is as follows:&lt;br /&gt;
&lt;br /&gt;
* 6:00PM - 6:30PM - Refreshments&lt;br /&gt;
* 6:30PM - ~9:30PM - Talks!&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
'''Speakers''':&lt;br /&gt;
&lt;br /&gt;
* '''Abraham Kang - DOM-based XSS and output encoding'''&lt;br /&gt;
&lt;br /&gt;
An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.&lt;br /&gt;
&lt;br /&gt;
* '''Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm'''&lt;br /&gt;
&lt;br /&gt;
Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server. Slides here: [[File:OWASP3011_Luca.pdf‎]]&lt;br /&gt;
   &lt;br /&gt;
Also, follow (and/or DM us) on twitter @owaspchicago&lt;br /&gt;
&lt;br /&gt;
We'll firm up the evening's agenda as the date nears.&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.] Any questions about the January meeting please contact [mailto:vitaly.mclain@gmail.com Vitaly McLain].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP3011_Luca.pdf&amp;diff=122956</id>
		<title>File:OWASP3011 Luca.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP3011_Luca.pdf&amp;diff=122956"/>
				<updated>2012-01-19T17:08:07Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: Luca Carettoni's OWASP Chicago slides presented on January 19th, 2012 on JBoss Security.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Luca Carettoni's OWASP Chicago slides presented on January 19th, 2012 on JBoss Security.&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=121048</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=121048"/>
				<updated>2011-12-03T06:54:01Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
=== Next Event  ===&lt;br /&gt;
&lt;br /&gt;
November 30, 2011 &lt;br /&gt;
&lt;br /&gt;
Stanford Campus, Alumni Center, Lane/Ladato rooms&amp;lt;br&amp;gt;&lt;br /&gt;
Directions: http://www.stanfordalumni.org/aboutsaa/alumni_center/directions.html&amp;lt;br&amp;gt;&lt;br /&gt;
Parking will be available on Galvez field right next to the center.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda''' &lt;br /&gt;
&lt;br /&gt;
5:30pm - Welcome&lt;br /&gt;
&lt;br /&gt;
5:40pm - Jason Chan, Practical Cloud Security [[Media:JasonChan-PracticalCloudSecurity.pdf | Slides]]&lt;br /&gt;
&lt;br /&gt;
6:15pm - Luca Carettoni, From CVE-2010-0738 to the recent JBoss worm [http://www.matasano.com/research/OWASP3011_Luca.pdf Slides]&lt;br /&gt;
&lt;br /&gt;
6:50pm - David Fifield, Evading censorship with browser-based proxies [[Media:Davidfifield-FlashProxy.pdf|Slides]]&lt;br /&gt;
&lt;br /&gt;
7:25pm - Abraham Kang, DOM-based XSS and output encoding [[Media:AbrahamKang-DOMBasedXSS.pptx|Slides]]&lt;br /&gt;
&lt;br /&gt;
'''You must RSVP''' at http://owaspbayareanov2011.eventbrite.com/ prior to attending, we need to know how many people are coming to make sure we have the correct room sizing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Jason Chan - Practical Cloud Security''' Over the past several years, there has been much hand wringing and teeth gnashing related to public cloud security. Because of this, many organizations have limited or delayed their cloud usage. Faced with business and market imperatives that demanded scale and elasticity that traditional data center architectures could not provide, Netflix jumped head first into the public cloud two years ago. As we continue to mature our environment, we’ve also begun leveraging the benefits of the public cloud to enhance our security posture and capabilities. This presentation will be a practical examination of Netflix’s approach to cloud security. Topics covered include: • Using public cloud automation and APIs to enhance security visibility • Netflix’s “Security Monkey” tool for cloud security monitoring and alerting • Inter-host reachability and connectivity analysis for firewall policy evaluation and optimization • Netflix’s model-driven architecture for securing and managingsystems and applications • Call to action: Cloud Security Gap Analysis and Next Steps &lt;br /&gt;
&lt;br /&gt;
'''Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm''' Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server. &lt;br /&gt;
&lt;br /&gt;
'''David Fifield - Evading censorship with browser-based proxies''' Proxy systems like Tor and VPNs can be used to get around Internet censorship and access blocked resources, but what happens when the circumvention system itself is blocked? A flash proxy is a miniature proxy that runs in a web browser, that can be activated just by viewing a web page. Web site visitors provide a large and constantly changing pool of proxy addresses that are difficult to block. Even though each proxy may last only seconds or minutes, it is possible to switch between them in a way that makes web browsing more or less seamless. We will share details of our flash proxy implementation and explain how to add a proxy to your web page. &lt;br /&gt;
&lt;br /&gt;
'''Abraham Kang - DOM-based XSS and output encoding''' An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event ===&lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Silicon Valley Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, August 25th, 2011 - From 6 PM to 8.30 PM &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': Mozilla Foundation Offices - 650 Castro Street, Unit 300, Mountain View , CA 94041 &lt;br /&gt;
&lt;br /&gt;
(right next to Starbucks)&lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://www.regonline.com/owaspsiliconvalleychaptermeeting&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
* 6:00 PM - 6:30 PM .............Check-in, registration, networking&lt;br /&gt;
* 6:30 PM – 6:35 PM ........... Welcome Remarks/Agenda - Mandeep Khera &lt;br /&gt;
* 6:35 PM - 7:45 PM ............ Enabling Browser Security in Web Applications- Michael Coates, Mozilla&lt;br /&gt;
* 7:45 PM – 8:30 PM…......... Blackhat spam SEO - Julien Sobrier, Zscaler&lt;br /&gt;
&lt;br /&gt;
'''SPONSORS''': Special Thanks to our host and sponsor - Mozilla Foundation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Bay Area Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=121047</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=121047"/>
				<updated>2011-12-03T06:52:50Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
=== Next Event  ===&lt;br /&gt;
&lt;br /&gt;
November 30, 2011 &lt;br /&gt;
&lt;br /&gt;
Stanford Campus, Alumni Center, Lane/Ladato rooms&amp;lt;br&amp;gt;&lt;br /&gt;
Directions: http://www.stanfordalumni.org/aboutsaa/alumni_center/directions.html&amp;lt;br&amp;gt;&lt;br /&gt;
Parking will be available on Galvez field right next to the center.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda''' &lt;br /&gt;
&lt;br /&gt;
5:30pm - Welcome&lt;br /&gt;
&lt;br /&gt;
5:40pm - Jason Chan, Practical Cloud Security [[Media:JasonChan-PracticalCloudSecurity.pdf | Slides]]&lt;br /&gt;
&lt;br /&gt;
6:15pm - Luca Carettoni, From CVE-2010-0738 to the recent JBoss worm [http://www.matasano.com/research/OWASP3011_Luca.pdf Slides]&lt;br /&gt;
&lt;br /&gt;
6:50pm - David Fifield, Evading censorship with browser-based proxies [[Media:AbrahamKang-DOMBasedXSS.pptx|Slides]]&lt;br /&gt;
&lt;br /&gt;
7:25pm - Abraham Kang, DOM-based XSS and output encoding [[Media:AbrahamKang-DOMBasedXSS.pptx|Slides]]&lt;br /&gt;
&lt;br /&gt;
'''You must RSVP''' at http://owaspbayareanov2011.eventbrite.com/ prior to attending, we need to know how many people are coming to make sure we have the correct room sizing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Jason Chan - Practical Cloud Security''' Over the past several years, there has been much hand wringing and teeth gnashing related to public cloud security. Because of this, many organizations have limited or delayed their cloud usage. Faced with business and market imperatives that demanded scale and elasticity that traditional data center architectures could not provide, Netflix jumped head first into the public cloud two years ago. As we continue to mature our environment, we’ve also begun leveraging the benefits of the public cloud to enhance our security posture and capabilities. This presentation will be a practical examination of Netflix’s approach to cloud security. Topics covered include: • Using public cloud automation and APIs to enhance security visibility • Netflix’s “Security Monkey” tool for cloud security monitoring and alerting • Inter-host reachability and connectivity analysis for firewall policy evaluation and optimization • Netflix’s model-driven architecture for securing and managingsystems and applications • Call to action: Cloud Security Gap Analysis and Next Steps &lt;br /&gt;
&lt;br /&gt;
'''Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm''' Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server. &lt;br /&gt;
&lt;br /&gt;
'''David Fifield - Evading censorship with browser-based proxies''' Proxy systems like Tor and VPNs can be used to get around Internet censorship and access blocked resources, but what happens when the circumvention system itself is blocked? A flash proxy is a miniature proxy that runs in a web browser, that can be activated just by viewing a web page. Web site visitors provide a large and constantly changing pool of proxy addresses that are difficult to block. Even though each proxy may last only seconds or minutes, it is possible to switch between them in a way that makes web browsing more or less seamless. We will share details of our flash proxy implementation and explain how to add a proxy to your web page. &lt;br /&gt;
&lt;br /&gt;
'''Abraham Kang - DOM-based XSS and output encoding''' An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event ===&lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Silicon Valley Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, August 25th, 2011 - From 6 PM to 8.30 PM &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': Mozilla Foundation Offices - 650 Castro Street, Unit 300, Mountain View , CA 94041 &lt;br /&gt;
&lt;br /&gt;
(right next to Starbucks)&lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://www.regonline.com/owaspsiliconvalleychaptermeeting&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
* 6:00 PM - 6:30 PM .............Check-in, registration, networking&lt;br /&gt;
* 6:30 PM – 6:35 PM ........... Welcome Remarks/Agenda - Mandeep Khera &lt;br /&gt;
* 6:35 PM - 7:45 PM ............ Enabling Browser Security in Web Applications- Michael Coates, Mozilla&lt;br /&gt;
* 7:45 PM – 8:30 PM…......... Blackhat spam SEO - Julien Sobrier, Zscaler&lt;br /&gt;
&lt;br /&gt;
'''SPONSORS''': Special Thanks to our host and sponsor - Mozilla Foundation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Bay Area Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Davidfifield-FlashProxy.pdf&amp;diff=121046</id>
		<title>File:Davidfifield-FlashProxy.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Davidfifield-FlashProxy.pdf&amp;diff=121046"/>
				<updated>2011-12-03T06:46:30Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Cscott&amp;diff=121045</id>
		<title>User:Cscott</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Cscott&amp;diff=121045"/>
				<updated>2011-12-03T06:46:15Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JasonChan-PracticalCloudSecurity.pdf]]&lt;br /&gt;
[[File:AbrahamKang-DOMBasedXSS.pptx]]&lt;br /&gt;
[[File:Davidfifield-FlashProxy.pdf]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:AbrahamKang-DOMBasedXSS.pptx&amp;diff=121044</id>
		<title>File:AbrahamKang-DOMBasedXSS.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:AbrahamKang-DOMBasedXSS.pptx&amp;diff=121044"/>
				<updated>2011-12-03T06:43:08Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Cscott&amp;diff=121043</id>
		<title>User:Cscott</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Cscott&amp;diff=121043"/>
				<updated>2011-12-03T06:42:55Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JasonChan-PracticalCloudSecurity.pdf]]&lt;br /&gt;
[[File:AbrahamKang-DOMBasedXSS.pptx]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:JasonChan-PracticalCloudSecurity.pdf&amp;diff=121042</id>
		<title>File:JasonChan-PracticalCloudSecurity.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:JasonChan-PracticalCloudSecurity.pdf&amp;diff=121042"/>
				<updated>2011-12-03T06:41:30Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Cscott&amp;diff=121041</id>
		<title>User:Cscott</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Cscott&amp;diff=121041"/>
				<updated>2011-12-03T06:41:08Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: Created page with &amp;quot;File:JasonChan-PracticalCloudSecurity.pdf&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:JasonChan-PracticalCloudSecurity.pdf]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=120635</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=120635"/>
				<updated>2011-11-23T05:04:06Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
=== Next Event  ===&lt;br /&gt;
&lt;br /&gt;
November 30, 2011 &lt;br /&gt;
&lt;br /&gt;
Stanford Campus, Alumni Center, Lane/Ladato rooms&amp;lt;br&amp;gt;&lt;br /&gt;
Directions: http://www.stanfordalumni.org/aboutsaa/alumni_center/directions.html&amp;lt;br&amp;gt;&lt;br /&gt;
Parking will be available on Galvez field right next to the center.&amp;lt;br&amp;gt;&lt;br /&gt;
'''Agenda''' &lt;br /&gt;
&lt;br /&gt;
5:30pm - Welcome&lt;br /&gt;
&lt;br /&gt;
5:40pm - Jason Chan, Practical Cloud Security &lt;br /&gt;
&lt;br /&gt;
6:15pm - Luca Carettoni, From CVE-2010-0738 to the recent JBoss worm &lt;br /&gt;
&lt;br /&gt;
6:50pm - David Fifield, Evading censorship with browser-based proxies &lt;br /&gt;
&lt;br /&gt;
7:25pm - Abraham Kang, DOM-based XSS and output encoding &lt;br /&gt;
&lt;br /&gt;
'''You must RSVP''' at http://owaspbayareanov2011.eventbrite.com/ prior to attending, we need to know how many people are coming to make sure we have the correct room sizing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Jason Chan - Practical Cloud Security''' Over the past several years, there has been much hand wringing and teeth gnashing related to public cloud security. Because of this, many organizations have limited or delayed their cloud usage. Faced with business and market imperatives that demanded scale and elasticity that traditional data center architectures could not provide, Netflix jumped head first into the public cloud two years ago. As we continue to mature our environment, we’ve also begun leveraging the benefits of the public cloud to enhance our security posture and capabilities. This presentation will be a practical examination of Netflix’s approach to cloud security. Topics covered include: • Using public cloud automation and APIs to enhance security visibility • Netflix’s “Security Monkey” tool for cloud security monitoring and alerting • Inter-host reachability and connectivity analysis for firewall policy evaluation and optimization • Netflix’s model-driven architecture for securing and managingsystems and applications • Call to action: Cloud Security Gap Analysis and Next Steps &lt;br /&gt;
&lt;br /&gt;
'''Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm''' Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server. &lt;br /&gt;
&lt;br /&gt;
'''David Fifield - Evading censorship with browser-based proxies''' Proxy systems like Tor and VPNs can be used to get around Internet censorship and access blocked resources, but what happens when the circumvention system itself is blocked? A flash proxy is a miniature proxy that runs in a web browser, that can be activated just by viewing a web page. Web site visitors provide a large and constantly changing pool of proxy addresses that are difficult to block. Even though each proxy may last only seconds or minutes, it is possible to switch between them in a way that makes web browsing more or less seamless. We will share details of our flash proxy implementation and explain how to add a proxy to your web page. &lt;br /&gt;
&lt;br /&gt;
'''Abraham Kang - DOM-based XSS and output encoding''' An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event ===&lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Silicon Valley Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, August 25th, 2011 - From 6 PM to 8.30 PM &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': Mozilla Foundation Offices - 650 Castro Street, Unit 300, Mountain View , CA 94041 &lt;br /&gt;
&lt;br /&gt;
(right next to Starbucks)&lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://www.regonline.com/owaspsiliconvalleychaptermeeting&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
* 6:00 PM - 6:30 PM .............Check-in, registration, networking&lt;br /&gt;
* 6:30 PM – 6:35 PM ........... Welcome Remarks/Agenda - Mandeep Khera &lt;br /&gt;
* 6:35 PM - 7:45 PM ............ Enabling Browser Security in Web Applications- Michael Coates, Mozilla&lt;br /&gt;
* 7:45 PM – 8:30 PM…......... Blackhat spam SEO - Julien Sobrier, Zscaler&lt;br /&gt;
&lt;br /&gt;
'''SPONSORS''': Special Thanks to our host and sponsor - Mozilla Foundation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Bay Area Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=120528</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=120528"/>
				<updated>2011-11-20T19:25:23Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
=== Next Event  ===&lt;br /&gt;
&lt;br /&gt;
November 30, 2011 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Stanford Campus, CIS Auditorium (CIS-X)&amp;lt;br&amp;gt;&lt;br /&gt;
Map:     http://campus-map.stanford.edu/?id=04-055&amp;amp;lat=37.4299079646&amp;amp;lng=-122.174800726&amp;amp;zoom=17&amp;amp;srch=CIS &amp;lt;br&amp;gt;&lt;br /&gt;
Directions: http://isl.stanford.edu/groups/elgamal/people/kfife/CIS-X_directions.pdf &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda''' &lt;br /&gt;
&lt;br /&gt;
5:30pm - Welcome&lt;br /&gt;
&lt;br /&gt;
5:40pm - Jason Chan, Practical Cloud Security &lt;br /&gt;
&lt;br /&gt;
6:15pm - Luca Carettoni, From CVE-2010-0738 to the recent JBoss worm &lt;br /&gt;
&lt;br /&gt;
6:50pm - David Fifield, Evading censorship with browser-based proxies &lt;br /&gt;
&lt;br /&gt;
7:25pm - Abraham Kang, DOM-based XSS and output encoding &lt;br /&gt;
&lt;br /&gt;
'''You must RSVP''' at http://owaspbayareanov2011.eventbrite.com/ prior to attending, we need to know how many people are coming to make sure we have the correct room sizing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Jason Chan - Practical Cloud Security''' Over the past several years, there has been much hand wringing and teeth gnashing related to public cloud security. Because of this, many organizations have limited or delayed their cloud usage. Faced with business and market imperatives that demanded scale and elasticity that traditional data center architectures could not provide, Netflix jumped head first into the public cloud two years ago. As we continue to mature our environment, we’ve also begun leveraging the benefits of the public cloud to enhance our security posture and capabilities. This presentation will be a practical examination of Netflix’s approach to cloud security. Topics covered include: • Using public cloud automation and APIs to enhance security visibility • Netflix’s “Security Monkey” tool for cloud security monitoring and alerting • Inter-host reachability and connectivity analysis for firewall policy evaluation and optimization • Netflix’s model-driven architecture for securing and managingsystems and applications • Call to action: Cloud Security Gap Analysis and Next Steps &lt;br /&gt;
&lt;br /&gt;
'''Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm''' Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server. &lt;br /&gt;
&lt;br /&gt;
'''David Fifield - Evading censorship with browser-based proxies''' Proxy systems like Tor and VPNs can be used to get around Internet censorship and access blocked resources, but what happens when the circumvention system itself is blocked? A flash proxy is a miniature proxy that runs in a web browser, that can be activated just by viewing a web page. Web site visitors provide a large and constantly changing pool of proxy addresses that are difficult to block. Even though each proxy may last only seconds or minutes, it is possible to switch between them in a way that makes web browsing more or less seamless. We will share details of our flash proxy implementation and explain how to add a proxy to your web page. &lt;br /&gt;
&lt;br /&gt;
'''Abraham Kang - DOM-based XSS and output encoding''' An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event ===&lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Silicon Valley Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, August 25th, 2011 - From 6 PM to 8.30 PM &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': Mozilla Foundation Offices - 650 Castro Street, Unit 300, Mountain View , CA 94041 &lt;br /&gt;
&lt;br /&gt;
(right next to Starbucks)&lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://www.regonline.com/owaspsiliconvalleychaptermeeting&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
* 6:00 PM - 6:30 PM .............Check-in, registration, networking&lt;br /&gt;
* 6:30 PM – 6:35 PM ........... Welcome Remarks/Agenda - Mandeep Khera &lt;br /&gt;
* 6:35 PM - 7:45 PM ............ Enabling Browser Security in Web Applications- Michael Coates, Mozilla&lt;br /&gt;
* 7:45 PM – 8:30 PM…......... Blackhat spam SEO - Julien Sobrier, Zscaler&lt;br /&gt;
&lt;br /&gt;
'''SPONSORS''': Special Thanks to our host and sponsor - Mozilla Foundation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Bay Area Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=119762</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=119762"/>
				<updated>2011-11-02T22:12:06Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
=== Next Event  ===&lt;br /&gt;
&lt;br /&gt;
November 30, 2011 &lt;br /&gt;
&lt;br /&gt;
Stanford Campus, Gates 104 Directions to the Gates building available here: http://forum.stanford.edu/visitors/directions/gates.php &lt;br /&gt;
&lt;br /&gt;
'''Agenda''' &lt;br /&gt;
&lt;br /&gt;
5:30pm - Welcome&lt;br /&gt;
&lt;br /&gt;
5:40pm - Jason Chan, Practical Cloud Security &lt;br /&gt;
&lt;br /&gt;
6:15pm - Luca Carettoni, From CVE-2010-0738 to the recent JBoss worm &lt;br /&gt;
&lt;br /&gt;
6:50pm - David Fifield, Evading censorship with browser-based proxies &lt;br /&gt;
&lt;br /&gt;
7:25pm - Abraham Kang, DOM-based XSS and output encoding &lt;br /&gt;
&lt;br /&gt;
'''You must RSVP''' at http://owaspbayareanov2011.eventbrite.com/ prior to attending, we need to know how many people are coming to make sure we have the correct room sizing. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
'''Jason Chan - Practical Cloud Security''' Over the past several years, there has been much hand wringing and teeth gnashing related to public cloud security. Because of this, many organizations have limited or delayed their cloud usage. Faced with business and market imperatives that demanded scale and elasticity that traditional data center architectures could not provide, Netflix jumped head first into the public cloud two years ago. As we continue to mature our environment, we’ve also begun leveraging the benefits of the public cloud to enhance our security posture and capabilities. This presentation will be a practical examination of Netflix’s approach to cloud security. Topics covered include: • Using public cloud automation and APIs to enhance security visibility • Netflix’s “Security Monkey” tool for cloud security monitoring and alerting • Inter-host reachability and connectivity analysis for firewall policy evaluation and optimization • Netflix’s model-driven architecture for securing and managingsystems and applications • Call to action: Cloud Security Gap Analysis and Next Steps &lt;br /&gt;
&lt;br /&gt;
'''Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm''' Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server. &lt;br /&gt;
&lt;br /&gt;
'''David Fifield - Evading censorship with browser-based proxies''' Proxy systems like Tor and VPNs can be used to get around Internet censorship and access blocked resources, but what happens when the circumvention system itself is blocked? A flash proxy is a miniature proxy that runs in a web browser, that can be activated just by viewing a web page. Web site visitors provide a large and constantly changing pool of proxy addresses that are difficult to block. Even though each proxy may last only seconds or minutes, it is possible to switch between them in a way that makes web browsing more or less seamless. We will share details of our flash proxy implementation and explain how to add a proxy to your web page. &lt;br /&gt;
&lt;br /&gt;
'''Abraham Kang - DOM-based XSS and output encoding''' An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event ===&lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Silicon Valley Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, August 25th, 2011 - From 6 PM to 8.30 PM &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': Mozilla Foundation Offices - 650 Castro Street, Unit 300, Mountain View , CA 94041 &lt;br /&gt;
&lt;br /&gt;
(right next to Starbucks)&lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://www.regonline.com/owaspsiliconvalleychaptermeeting&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
* 6:00 PM - 6:30 PM .............Check-in, registration, networking&lt;br /&gt;
* 6:30 PM – 6:35 PM ........... Welcome Remarks/Agenda - Mandeep Khera &lt;br /&gt;
* 6:35 PM - 7:45 PM ............ Enabling Browser Security in Web Applications- Michael Coates, Mozilla&lt;br /&gt;
* 7:45 PM – 8:30 PM…......... Blackhat spam SEO - Julien Sobrier, Zscaler&lt;br /&gt;
&lt;br /&gt;
'''SPONSORS''': Special Thanks to our host and sponsor - Mozilla Foundation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Bay Area Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=119761</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=119761"/>
				<updated>2011-11-02T22:11:20Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Previous Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
=== Next Event ===&lt;br /&gt;
&lt;br /&gt;
November 30, 2011&lt;br /&gt;
&lt;br /&gt;
Stanford Campus, Gates 104&lt;br /&gt;
Directions to the Gates building available here: http://forum.stanford.edu/visitors/directions/gates.php&lt;br /&gt;
 &lt;br /&gt;
'''Agenda'''&lt;br /&gt;
5:30pm - Welcome&lt;br /&gt;
5:40pm - Jason Chan, Practical Cloud Security&lt;br /&gt;
6:15pm - Luca Carettoni, From CVE-2010-0738 to the recent JBoss worm&lt;br /&gt;
6:50pm - David Fifield, Evading censorship with browser-based proxies &lt;br /&gt;
7:25pm - Abraham Kang, DOM-based XSS and output encoding&lt;br /&gt;
&lt;br /&gt;
'''You must RSVP''' at http://owaspbayareanov2011.eventbrite.com/ prior to attending, we need to know how many people are coming to make sure we have the correct room sizing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Jason Chan - Practical Cloud Security&lt;br /&gt;
'''&lt;br /&gt;
Over the past several years, there has been much hand wringing and teeth gnashing related to public cloud security. Because of this, many organizations have limited or delayed their cloud usage.&lt;br /&gt;
Faced with business and market imperatives that demanded scale and elasticity that traditional data center architectures could not provide, Netflix jumped head first into the public cloud two years ago.  As we continue to mature our environment, we’ve also begun leveraging the benefits of the public cloud to enhance our security posture and capabilities.&lt;br /&gt;
This presentation will be a practical examination of Netflix’s approach to cloud security. Topics covered include:&lt;br /&gt;
•       Using public cloud automation and APIs to enhance security visibility&lt;br /&gt;
•       Netflix’s “Security Monkey” tool for cloud security monitoring and alerting&lt;br /&gt;
•       Inter-host reachability and connectivity analysis for firewall policy evaluation and optimization&lt;br /&gt;
•       Netflix’s model-driven architecture for securing and managingsystems and applications&lt;br /&gt;
•       Call to action: Cloud Security Gap Analysis and Next Steps&lt;br /&gt;
&lt;br /&gt;
'''Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm&lt;br /&gt;
'''&lt;br /&gt;
Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server.  &lt;br /&gt;
&lt;br /&gt;
'''David Fifield - Evading censorship with browser-based proxies&lt;br /&gt;
'''&lt;br /&gt;
Proxy systems like Tor and VPNs can be used to get around Internet censorship and access blocked resources, but what happens when the circumvention system itself is blocked? A flash proxy is a miniature proxy that runs in a web browser, that can be activated just by viewing a web page. Web site visitors provide a large and constantly changing pool of proxy addresses that are difficult to block. Even though each proxy may last only seconds or minutes, it is possible to switch between them in a way that makes web browsing more or less seamless. We will share details of our flash proxy implementation and explain how to add a proxy to your web page.&lt;br /&gt;
&lt;br /&gt;
'''Abraham Kang - DOM-based XSS and output encoding&lt;br /&gt;
'''&lt;br /&gt;
An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event ===&lt;br /&gt;
&lt;br /&gt;
'''WHAT''': OWASP Silicon Valley Chapter Meeting&lt;br /&gt;
&lt;br /&gt;
'''WHEN''': Thursday, August 25th, 2011 - From 6 PM to 8.30 PM &lt;br /&gt;
&lt;br /&gt;
'''WHERE''': Mozilla Foundation Offices - 650 Castro Street, Unit 300, Mountain View , CA 94041 &lt;br /&gt;
&lt;br /&gt;
(right next to Starbucks)&lt;br /&gt;
&lt;br /&gt;
REGISTER EARLY AS SEATING IS LIMITED&lt;br /&gt;
&lt;br /&gt;
Please RSVP by registering at http://www.regonline.com/owaspsiliconvalleychaptermeeting&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
* 6:00 PM - 6:30 PM .............Check-in, registration, networking&lt;br /&gt;
* 6:30 PM – 6:35 PM ........... Welcome Remarks/Agenda - Mandeep Khera &lt;br /&gt;
* 6:35 PM - 7:45 PM ............ Enabling Browser Security in Web Applications- Michael Coates, Mozilla&lt;br /&gt;
* 7:45 PM – 8:30 PM…......... Blackhat spam SEO - Julien Sobrier, Zscaler&lt;br /&gt;
&lt;br /&gt;
'''SPONSORS''': Special Thanks to our host and sponsor - Mozilla Foundation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Bay Area Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=119760</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=119760"/>
				<updated>2011-11-02T22:10:59Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Event */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
=== Next Event ===&lt;br /&gt;
&lt;br /&gt;
November 30, 2011&lt;br /&gt;
&lt;br /&gt;
Stanford Campus, Gates 104&lt;br /&gt;
Directions to the Gates building available here: http://forum.stanford.edu/visitors/directions/gates.php&lt;br /&gt;
 &lt;br /&gt;
'''Agenda'''&lt;br /&gt;
5:30pm - Welcome&lt;br /&gt;
5:40pm - Jason Chan, Practical Cloud Security&lt;br /&gt;
6:15pm - Luca Carettoni, From CVE-2010-0738 to the recent JBoss worm&lt;br /&gt;
6:50pm - David Fifield, Evading censorship with browser-based proxies &lt;br /&gt;
7:25pm - Abraham Kang, DOM-based XSS and output encoding&lt;br /&gt;
&lt;br /&gt;
'''You must RSVP''' at http://owaspbayareanov2011.eventbrite.com/ prior to attending, we need to know how many people are coming to make sure we have the correct room sizing.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
'''Jason Chan - Practical Cloud Security&lt;br /&gt;
'''&lt;br /&gt;
Over the past several years, there has been much hand wringing and teeth gnashing related to public cloud security. Because of this, many organizations have limited or delayed their cloud usage.&lt;br /&gt;
Faced with business and market imperatives that demanded scale and elasticity that traditional data center architectures could not provide, Netflix jumped head first into the public cloud two years ago.  As we continue to mature our environment, we’ve also begun leveraging the benefits of the public cloud to enhance our security posture and capabilities.&lt;br /&gt;
This presentation will be a practical examination of Netflix’s approach to cloud security. Topics covered include:&lt;br /&gt;
•       Using public cloud automation and APIs to enhance security visibility&lt;br /&gt;
•       Netflix’s “Security Monkey” tool for cloud security monitoring and alerting&lt;br /&gt;
•       Inter-host reachability and connectivity analysis for firewall policy evaluation and optimization&lt;br /&gt;
•       Netflix’s model-driven architecture for securing and managingsystems and applications&lt;br /&gt;
•       Call to action: Cloud Security Gap Analysis and Next Steps&lt;br /&gt;
&lt;br /&gt;
'''Luca Carettoni - From CVE-2010-0738 to the recent JBoss worm&lt;br /&gt;
'''&lt;br /&gt;
Being a widely deployed enterprise application server, JBoss has always been a juicy target for attackers. Security vulnerabilities and misconfigurations in critical components, such as the infamous JMX-console, can be exploited in order to execute arbitrary code and harm the confidentiality, integrity and availability of the entire system. Our quick journey through JBoss insecurity will start from the analysis of a critical authentication bypass flaw to the recent JBoss worm which affected numerous installations worldwide. This presentation will also cover practical aspects on how to detect misconfigurations and secure your application server.  &lt;br /&gt;
&lt;br /&gt;
'''David Fifield - Evading censorship with browser-based proxies&lt;br /&gt;
'''&lt;br /&gt;
Proxy systems like Tor and VPNs can be used to get around Internet censorship and access blocked resources, but what happens when the circumvention system itself is blocked? A flash proxy is a miniature proxy that runs in a web browser, that can be activated just by viewing a web page. Web site visitors provide a large and constantly changing pool of proxy addresses that are difficult to block. Even though each proxy may last only seconds or minutes, it is possible to switch between them in a way that makes web browsing more or less seamless. We will share details of our flash proxy implementation and explain how to add a proxy to your web page.&lt;br /&gt;
&lt;br /&gt;
'''Abraham Kang - DOM-based XSS and output encoding&lt;br /&gt;
'''&lt;br /&gt;
An interactive presentation that intends to turn all of the listeners of the presentation into XSS experts and help them understand how to mitigate XSS properly using output encoding.&lt;br /&gt;
&lt;br /&gt;
=== Previous Event ===&lt;br /&gt;
&lt;br /&gt;
When: June 22nd 11:30am - 1:30pm&lt;br /&gt;
&lt;br /&gt;
Where:  Pacific Gas &amp;amp; Electric Co Inc, 245 Market Street, Room 1417, San Francisco CA 94111 [http://maps.google.com/maps?q=245+market+street+san+francisco+ca&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=245+Market+St,+San+Francisco,+California+94111&amp;amp;gl=us&amp;amp;z=16 Directions]&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
&lt;br /&gt;
Networking&lt;br /&gt;
&lt;br /&gt;
1) Tom Brennan, International Board of Directors OWASP Foundation &amp;quot;Where we are... Where we are going&amp;quot; &lt;br /&gt;
&lt;br /&gt;
2) Sam Bowne, City College San Francisco Computer Networking and Information Technology- [http://samsclass.info/contact.html BIO]&lt;br /&gt;
&lt;br /&gt;
3) TBD&lt;br /&gt;
&lt;br /&gt;
RSVP to: Teresa Stevens - ExSi(at)pge(dot)com so she can get a head count. &lt;br /&gt;
&lt;br /&gt;
Lunch will be provided.&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Bay Area Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=110800</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=110800"/>
				<updated>2011-05-19T17:14:15Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Date and Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
*SAVE THE DATE* &lt;br /&gt;
&lt;br /&gt;
When: June 22nd 11:30am - 1:30pm&lt;br /&gt;
&lt;br /&gt;
Where:  Pacific Gas &amp;amp; Electric Co Inc, 245 Market Street, Room 1417, San Francisco CA 94111 [http://maps.google.com/maps?q=245+market+street+san+francisco+ca&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=245+Market+St,+San+Francisco,+California+94111&amp;amp;gl=us&amp;amp;z=16 Directions]&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
Tom Brennan - OWASP &amp;quot;Where we are... Where we are going&amp;quot; and local [https://www.owasp.org/index.php/Category:Chapter_Handbook chapter workshop] to building a successful OWASP Chapter(s) &lt;br /&gt;
&lt;br /&gt;
Sam Bowne, City College San Francisco Computer Networking and Information Technology- [http://samsclass.info/contact.html BIO]&lt;br /&gt;
&lt;br /&gt;
RSVP to: Teresa Stevens - ExSi(at)pge(dot)com so she can get a head count. &lt;br /&gt;
&lt;br /&gt;
Lunch will be provided.&lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Bay Area Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=110391</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=110391"/>
				<updated>2011-05-13T21:03:45Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}} &lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings  ====&lt;br /&gt;
&lt;br /&gt;
== Date and Location  ==&lt;br /&gt;
&lt;br /&gt;
*SAVE THE DATE* &lt;br /&gt;
&lt;br /&gt;
When: June 22nd 1:00pm - 4:00pm&lt;br /&gt;
&lt;br /&gt;
Where:  Pacific Gas &amp;amp; Electric Co Inc, 245 Market Street, Room 1417, San Francisco CA 94111 [http://maps.google.com/maps?q=245+market+street+san+francisco+ca&amp;amp;ie=UTF8&amp;amp;hq=&amp;amp;hnear=245+Market+St,+San+Francisco,+California+94111&amp;amp;gl=us&amp;amp;z=16 Directions]&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
Tom Brennan - OWASP &amp;quot;Where we are... Where we are going&amp;quot; and local [https://www.owasp.org/index.php/AppSecEU2011#tab=Chapters_Workshop chapter workshop] to building a successful OWASP Chapter(s) &lt;br /&gt;
&lt;br /&gt;
RSVP to: Teresa Stevens - ExSi(at)pge(dot)com &lt;br /&gt;
&lt;br /&gt;
==== Donate Funds to Bay Area Chapter  ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Bay Area Past Events  =&lt;br /&gt;
&lt;br /&gt;
[[Bay Area Past Events]] &lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders  ====&lt;br /&gt;
&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini] &lt;br /&gt;
*[http://garrettgee.com Garrett Gee] &lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera] &lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=82960</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=82960"/>
				<updated>2010-05-03T21:22:47Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: February 2, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 in the Monadnock Building conference room (53 W Jackson, 8th floor) at 6pm. Please RSVP to cory.scott@owasp.org by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 - Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 -  '''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''' - Erik Peterson, Veracode&lt;br /&gt;
&lt;br /&gt;
7:15 - '''Open Software Assurance Maturity Model (OpenSAMM)''' - Pravir Chandra, Fortify&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:mtracy@matasano.com Mike Tracy] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=82959</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=82959"/>
				<updated>2010-05-03T21:19:53Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: February 2, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 in the Monadnock Building conference room (53 W Jackson, 8th floor) at 6pm. Please RSVP to cory.scott@owasp.org by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 - Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 -  '''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''' - Erik Peterson, Veracode&lt;br /&gt;
&lt;br /&gt;
7:15 - '''Open Software Assurance Maturity Model (OpenSAMM)''' - Pravir Chandra, Fortify&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:mtracy@matasano.com Mike Tracy]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=76029</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=76029"/>
				<updated>2010-01-11T17:25:01Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Chapter Meeting: February 2, 2010 *New Location* */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: February 2, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 in the Monadnock Building conference room (53 W Jackson, 8th floor) at 6pm. Please RSVP to cory.scott@owasp.org by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 - Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 -  '''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''' - Erik Peterson, Veracode&lt;br /&gt;
&lt;br /&gt;
7:15 - '''Open Software Assurance Maturity Model (OpenSAMM)''' - Pravir Chandra, Fortify&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=76028</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=76028"/>
				<updated>2010-01-11T17:23:54Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: February 2, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 in the Monadnock Building conference room (53 W Jackson, 8th floor) at 6pm. Please RSVP to cory@crazypenguin.com by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 - Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 -  '''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''' - Erik Peterson, Veracode&lt;br /&gt;
&lt;br /&gt;
7:15 - '''Open Software Assurance Maturity Model (OpenSAMM)''' - Pravir Chandra, Fortify&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=76027</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=76027"/>
				<updated>2010-01-11T17:23:26Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: February 2, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 in the Monadnock Building conference room (53 W Jackson, 8th floor) at 6pm. Please RSVP to cory@crazypenguin.com by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 '''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''' - Erik Peterson, Veracode&lt;br /&gt;
&lt;br /&gt;
7:15 '''Open Software Assurance Maturity Model (OpenSAMM)''' - Pravir Chandra, Fortify&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=76026</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=76026"/>
				<updated>2010-01-11T17:22:13Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: February 2, 2010 *New Location* ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 in the Monadnock Building conference room (53 W Jackson, 8th floor) at 6pm. Please RSVP to cory@crazypenguin.com by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data - Erik Peterson, Veracode&lt;br /&gt;
&lt;br /&gt;
7:15 Open Software Assurance Maturity Model (OpenSAMM) - Pravir Chandra, Fortify&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75978</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75978"/>
				<updated>2010-01-10T20:05:24Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Presentation abstracts */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: February 2, 2010 ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 at a location to be determined at 6pm. Please RSVP to cory@crazypenguin.com by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data - Erik Peterson, Veracode&lt;br /&gt;
&lt;br /&gt;
7:15 Open Software Assurance Maturity Model (OpenSAMM) - Pravir Chandra, Fortify&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
*   Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
*    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
*    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75977</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75977"/>
				<updated>2010-01-10T20:04:16Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Chapter Meeting: February 2, 2010 ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 at a location to be determined at 6pm. Please RSVP to cory@crazypenguin.com by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data - Erik Peterson, Veracode&lt;br /&gt;
&lt;br /&gt;
7:15 Open Software Assurance Maturity Model (OpenSAMM) - Pravir Chandra, Fortify&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
·    Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
·    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
·    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL. &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75976</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75976"/>
				<updated>2010-01-10T20:02:41Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Next Meeting: February 2, 2010 ==&lt;br /&gt;
&lt;br /&gt;
Make sure you sign up for the mailing list to receive meeting announcements.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
== General Information ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 at a location to be determined at 6pm. Please RSVP to cory@crazypenguin.com by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data - Erik Peterson, Veracode&lt;br /&gt;
&lt;br /&gt;
7:15 Open Software Assurance Maturity Model (OpenSAMM) - Pravir Chandra, Fortify&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''Protecting Your Applications from Backdoors: How to Secure Your Business Critical Applications from Time Bombs, Backdoors &amp;amp; Data''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
With the increasing practice of outsourcing and using 3rd party libraries, it is nearly impossible for an enterprise to identify the pedigree and security of the software running its business critical applications. As a result backdoors and malicious code are increasingly becoming the prevalent attack vector used by hackers.&lt;br /&gt;
Whether you manage internal development activities, work with third party developers or are developing a COTS application for enterprise, your mandate is clear- safeguard your code and make applications security a priority for internal and external development teams.&lt;br /&gt;
In this session we will cover;&lt;br /&gt;
·    Prevalence of backdoors and malicious code in third party attacks&lt;br /&gt;
·    Definitions and classifications of backdoors and their impact on your applications&lt;br /&gt;
·    Methods to identify, track and remediate these vulnerabilities&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Erik Peterson from Veracode will be presenting.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Open Software Assurance Maturity Model (OpenSAMM)''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The Open Software Assurance Maturity Model (SAMM) (http://www.opensamm.org/) is a flexible and prescriptive framework for building security into a software development organization. Covering more than typical SDLC-based models for security, SAMM enables organizations to self-assess their security assurance program and then use recommended roadmaps to improve in a way that's aligned to the specific risks facing the organization. Beyond that, SAMM enables creation of scorecards for an organization's effectiveness at secure software development throughout the typical governance, development, and deployment business functions. Scorecards also enable management within an organization to demonstrate quantitative improvements through iterations of building a security assurance program. This workshop will introduce the SAMM framework and walk through useful activities such as assessing an assurance program, mapping an existing organization to a recommended roadmap, and iteratively building an assurance program. Time allowing, additional case studies will also be discussed. OpenSAMM is an open a free project and has recently been donated to the Open Web Application Security Project (OWASP) Foundation. For more information on OpenSAMM, visit http://www.opensamm.org/. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Pravir Chandra is Director of Strategic Services at Fortify Software and works with clients on software security assurance programs. Pravir is recognized for his expertise in software security, code analysis, and his ability to strategically apply technical knowledge. Prior to Fortify, he was a Principal Consultant affiliated with Cigital and led large software security programs at Fortune 500 companies. Pravir Co-Founded Secure Software, Inc. and was Chief Security Architect prior to its acquisition by Fortify. He recently created and led the Open Software Assurance Maturity Model (OpenSAMM) project with the OWASP Foundation, leads the OWASP CLASP project, and also serves as member of the OWASP Global Projects Committee. Pravir is author of the book Network Security with OpenSSL. &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75975</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75975"/>
				<updated>2010-01-10T19:57:46Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==Next Meeting: February 2, 2010==&lt;br /&gt;
&lt;br /&gt;
Mark your calendars - agenda to follow.&lt;br /&gt;
&lt;br /&gt;
'Make sure you sign up for the mailing list to receive meeting announcements.'&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
== Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 at a location to be determined at 6pm. Please RSVP to cory@crazypenguin.com by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates&lt;br /&gt;
&lt;br /&gt;
7:15 Assessing Thick Web Applications - Timur Duehr&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.&lt;br /&gt;
&lt;br /&gt;
''Assessing Thick Web Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
Recently, web applications have been pushing more application to the browser and in many cases entirely out of the browser. Technologies for pushing richer content to the client, such as ActiveX, Flash, Google's NaCl and browser extensions, can frustrate efforts to assess an application. Occasionally, these technologies remove the browser entirely to create a semi thick client that uses standard web application methodologies and transport methods.&lt;br /&gt;
&lt;br /&gt;
While a few framework specific tools have begun to mature, they are geared toward debugging an application for quality assurance purposes rather than security assessment. A solution for many of these technologies is simply repurposing and reinventing some of the old application assessment tool chain: the debugger. A new generation of scriptable debuggers is showing up. Using these tools allows increased automation and visibility into the newest thick web application frameworks.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Timur Duehr is a Security Consultant at Matasano Security and a graduate student in Mathematical Computer Science at the University of Illinois at Chicago. Timur is one of the lead developers of Ragweed, a scriptable debugger written in Ruby for win32, OSX and linux applications.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75974</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75974"/>
				<updated>2010-01-10T19:56:59Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty].&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: February 2, 2010==&lt;br /&gt;
&lt;br /&gt;
Mark your calendars - agenda to follow.&lt;br /&gt;
&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
== Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 at a location to be determined at 6pm. Please RSVP to cory@crazypenguin.com by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates&lt;br /&gt;
&lt;br /&gt;
7:15 Assessing Thick Web Applications - Timur Duehr&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.&lt;br /&gt;
&lt;br /&gt;
''Assessing Thick Web Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
Recently, web applications have been pushing more application to the browser and in many cases entirely out of the browser. Technologies for pushing richer content to the client, such as ActiveX, Flash, Google's NaCl and browser extensions, can frustrate efforts to assess an application. Occasionally, these technologies remove the browser entirely to create a semi thick client that uses standard web application methodologies and transport methods.&lt;br /&gt;
&lt;br /&gt;
While a few framework specific tools have begun to mature, they are geared toward debugging an application for quality assurance purposes rather than security assessment. A solution for many of these technologies is simply repurposing and reinventing some of the old application assessment tool chain: the debugger. A new generation of scriptable debuggers is showing up. Using these tools allows increased automation and visibility into the newest thick web application frameworks.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Timur Duehr is a Security Consultant at Matasano Security and a graduate student in Mathematical Computer Science at the University of Illinois at Chicago. Timur is one of the lead developers of Ragweed, a scriptable debugger written in Ruby for win32, OSX and linux applications.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75973</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75973"/>
				<updated>2010-01-10T19:55:42Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: February 2, 2010==&lt;br /&gt;
&lt;br /&gt;
Mark your calendars - agenda to follow.&lt;br /&gt;
&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
== Chapter Meetings ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be February 2nd, 2010 at a location to be determined at 6pm. Please RSVP to cory@crazypenguin.com by February 1st so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates&lt;br /&gt;
&lt;br /&gt;
7:15 Assessing Thick Web Applications - Timur Duehr&lt;br /&gt;
&lt;br /&gt;
==Presentation abstracts==&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.&lt;br /&gt;
&lt;br /&gt;
''Assessing Thick Web Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
Recently, web applications have been pushing more application to the browser and in many cases entirely out of the browser. Technologies for pushing richer content to the client, such as ActiveX, Flash, Google's NaCl and browser extensions, can frustrate efforts to assess an application. Occasionally, these technologies remove the browser entirely to create a semi thick client that uses standard web application methodologies and transport methods.&lt;br /&gt;
&lt;br /&gt;
While a few framework specific tools have begun to mature, they are geared toward debugging an application for quality assurance purposes rather than security assessment. A solution for many of these technologies is simply repurposing and reinventing some of the old application assessment tool chain: the debugger. A new generation of scriptable debuggers is showing up. Using these tools allows increased automation and visibility into the newest thick web application frameworks.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Timur Duehr is a Security Consultant at Matasano Security and a graduate student in Mathematical Computer Science at the University of Illinois at Chicago. Timur is one of the lead developers of Ragweed, a scriptable debugger written in Ruby for win32, OSX and linux applications.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75937</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75937"/>
				<updated>2010-01-09T00:36:06Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: February 2, 2010==&lt;br /&gt;
&lt;br /&gt;
Mark your calendars - agenda to follow.&lt;br /&gt;
&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be September 17th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to cory@crazypenguin.com by September 16th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates&lt;br /&gt;
&lt;br /&gt;
7:15 Assessing Thick Web Applications - Timur Duehr&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.&lt;br /&gt;
&lt;br /&gt;
''Assessing Thick Web Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
Recently, web applications have been pushing more application to the browser and in many cases entirely out of the browser. Technologies for pushing richer content to the client, such as ActiveX, Flash, Google's NaCl and browser extensions, can frustrate efforts to assess an application. Occasionally, these technologies remove the browser entirely to create a semi thick client that uses standard web application methodologies and transport methods.&lt;br /&gt;
&lt;br /&gt;
While a few framework specific tools have begun to mature, they are geared toward debugging an application for quality assurance purposes rather than security assessment. A solution for many of these technologies is simply repurposing and reinventing some of the old application assessment tool chain: the debugger. A new generation of scriptable debuggers is showing up. Using these tools allows increased automation and visibility into the newest thick web application frameworks.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Timur Duehr is a Security Consultant at Matasano Security and a graduate student in Mathematical Computer Science at the University of Illinois at Chicago. Timur is one of the lead developers of Ragweed, a scriptable debugger written in Ruby for win32, OSX and linux applications.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75936</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=75936"/>
				<updated>2010-01-09T00:35:41Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: February 2, 2010==&lt;br /&gt;
&lt;br /&gt;
Mark your calendars - agenda to follow.&lt;br /&gt;
&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be September 17th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to cory@crazypenguin.com by September 16th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates&lt;br /&gt;
&lt;br /&gt;
7:15 Assessing Thick Web Applications - Timur Duehr&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.&lt;br /&gt;
&lt;br /&gt;
''Assessing Thick Web Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
Recently, web applications have been pushing more application to the browser and in many cases entirely out of the browser. Technologies for pushing richer content to the client, such as ActiveX, Flash, Google's NaCl and browser extensions, can frustrate efforts to assess an application. Occasionally, these technologies remove the browser entirely to create a semi thick client that uses standard web application methodologies and transport methods.&lt;br /&gt;
&lt;br /&gt;
While a few framework specific tools have begun to mature, they are geared toward debugging an application for quality assurance purposes rather than security assessment. A solution for many of these technologies is simply repurposing and reinventing some of the old application assessment tool chain: the debugger. A new generation of scriptable debuggers is showing up. Using these tools allows increased automation and visibility into the newest thick web application frameworks.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Timur Duehr is a Security Consultant at Matasano Security and a graduate student in Mathematical Computer Science at the University of Illinois at Chicago. Timur is one of the lead developers of Ragweed, a scriptable debugger written in Ruby for win32, OSX and linux applications.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=68479</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=68479"/>
				<updated>2009-09-03T02:56:24Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Presentation abstracts */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: September 17th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be September 17th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to cory@crazypenguin.com by September 16th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates&lt;br /&gt;
&lt;br /&gt;
7:15 Assessing Thick Web Applications - Timur Duehr&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.&lt;br /&gt;
&lt;br /&gt;
''Assessing Thick Web Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
Recently, web applications have been pushing more application to the browser and in many cases entirely out of the browser. Technologies for pushing richer content to the client, such as ActiveX, Flash, Google's NaCl and browser extensions, can frustrate efforts to assess an application. Occasionally, these technologies remove the browser entirely to create a semi thick client that uses standard web application methodologies and transport methods.&lt;br /&gt;
&lt;br /&gt;
While a few framework specific tools have begun to mature, they are geared toward debugging an application for quality assurance purposes rather than security assessment. A solution for many of these technologies is simply repurposing and reinventing some of the old application assessment tool chain: the debugger. A new generation of scriptable debuggers is showing up. Using these tools allows increased automation and visibility into the newest thick web application frameworks.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Timur Duehr is a Security Consultant at Matasano Security and a graduate student in Mathematical Computer Science at the University of Illinois at Chicago. Timur is one of the lead developers of Ragweed, a scriptable debugger written in Ruby for win32, OSX and linux applications.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=68478</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=68478"/>
				<updated>2009-09-03T02:55:29Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: September 17th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be September 17th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to cory@crazypenguin.com by September 16th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates&lt;br /&gt;
&lt;br /&gt;
7:15 Assessing Thick Web Applications - Timur Duehr&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing. &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=68004</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=68004"/>
				<updated>2009-08-25T15:27:05Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: September 17th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be September 17th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to cory@crazypenguin.com by September 16th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates&lt;br /&gt;
&lt;br /&gt;
7:15 TBD&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing. &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=68001</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=68001"/>
				<updated>2009-08-25T14:53:47Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Meeting: October 17th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: September 17th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be September 17th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by September 16th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates&lt;br /&gt;
&lt;br /&gt;
7:15 TBD&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing. &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=68000</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=68000"/>
				<updated>2009-08-25T14:43:39Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: October 17th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be September 17th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by September 16th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates&lt;br /&gt;
&lt;br /&gt;
7:15 TBD&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing. &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=67998</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=67998"/>
				<updated>2009-08-25T14:40:00Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Meeting: April 29th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: October 17th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be April 29th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by April 28th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Doing more with less? : Automate or Die - Ed Bellis, Orbitz&lt;br /&gt;
&lt;br /&gt;
7:15 Rich Internet Applications - Rafal Los&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''Doing more with less? : Automate or Die''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The harsh economic climate has hit us all in some way. Budgets are trimmed and spending is down. We are continuously asked to do more with less, but how? Certainly the attackers aren’t spending less! Our web applications continue to grow in size and complexity. So what can an InfoSec team do to become more efficient and still effectively protect our applications?&lt;br /&gt;
&lt;br /&gt;
At Orbitz, our team took a hard look at where we were spending a lot of our time – the grunt work – and how we could spend less of it. After building out a fairly comprehensive vulnerability management program and using a lot of best in breed tools, we found ourselves with an overabundance of manual labor on our hands putting together the pieces of our vulnerability puzzle. After looking around the market space, we found nothing that could really help us with this growing problem. Low and behold, there’s a government set of standards now to put all this together. What the heck, let’s build it! &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Ed Bellis is responsible for the protection and security of all information and electronic assets as well as compliance and ethics across the wide array of business units that make up Orbitz Worldwide on a global basis. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business.&lt;br /&gt;
&lt;br /&gt;
With over 15 years of experience in information security and technology, Ed has worked with and been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate Information Security for Bank of America within their Global Corporate and Investment Banking division. His credentials also include several security technology and management roles at organizations such as Ernst &amp;amp; Young, Ford Motor Company, and Young &amp;amp; Rubicam. Ed is a CISSP, CISM, a contributor to the ISM Community, and a member of ISC2, ISACA and the Chicago chapter of the ISSA.&lt;br /&gt;
&lt;br /&gt;
Ed is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as The MIS Institute, The Association of Information Technology Professionals, Technology Executives Club, and the National Business Travel Association. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Rich Internet Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
What does &amp;quot;Web 2.0&amp;quot; mean to your business?  If you're like most companies it means publishing sites that are more interactive, more flashy,&lt;br /&gt;
more customer-catching.  To you and your developers that means using technologies for creating RIA (Rich Internet Applications) like Flash and&lt;br /&gt;
AJAX and delivering as quickly as possible.  This talk focuses on some of the issues that arise when those technologies are used to drive high-end,&lt;br /&gt;
interactive web applications without proper security sanity checks.  Learn the mistakes, and some of the things you can do to avoid them before your&lt;br /&gt;
company commits these fatal flaws.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=59302</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=59302"/>
				<updated>2009-04-21T15:16:29Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Presentation abstracts */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: April 29th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be April 29th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by April 28th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Doing more with less? : Automate or Die - Ed Bellis, Orbitz&lt;br /&gt;
&lt;br /&gt;
7:15 Rich Internet Applications - Rafal Los&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''Doing more with less? : Automate or Die''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The harsh economic climate has hit us all in some way. Budgets are trimmed and spending is down. We are continuously asked to do more with less, but how? Certainly the attackers aren’t spending less! Our web applications continue to grow in size and complexity. So what can an InfoSec team do to become more efficient and still effectively protect our applications?&lt;br /&gt;
&lt;br /&gt;
At Orbitz, our team took a hard look at where we were spending a lot of our time – the grunt work – and how we could spend less of it. After building out a fairly comprehensive vulnerability management program and using a lot of best in breed tools, we found ourselves with an overabundance of manual labor on our hands putting together the pieces of our vulnerability puzzle. After looking around the market space, we found nothing that could really help us with this growing problem. Low and behold, there’s a government set of standards now to put all this together. What the heck, let’s build it! &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Ed Bellis is responsible for the protection and security of all information and electronic assets as well as compliance and ethics across the wide array of business units that make up Orbitz Worldwide on a global basis. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business.&lt;br /&gt;
&lt;br /&gt;
With over 15 years of experience in information security and technology, Ed has worked with and been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate Information Security for Bank of America within their Global Corporate and Investment Banking division. His credentials also include several security technology and management roles at organizations such as Ernst &amp;amp; Young, Ford Motor Company, and Young &amp;amp; Rubicam. Ed is a CISSP, CISM, a contributor to the ISM Community, and a member of ISC2, ISACA and the Chicago chapter of the ISSA.&lt;br /&gt;
&lt;br /&gt;
Ed is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as The MIS Institute, The Association of Information Technology Professionals, Technology Executives Club, and the National Business Travel Association. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Rich Internet Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
What does &amp;quot;Web 2.0&amp;quot; mean to your business?  If you're like most companies it means publishing sites that are more interactive, more flashy,&lt;br /&gt;
more customer-catching.  To you and your developers that means using technologies for creating RIA (Rich Internet Applications) like Flash and&lt;br /&gt;
AJAX and delivering as quickly as possible.  This talk focuses on some of the issues that arise when those technologies are used to drive high-end,&lt;br /&gt;
interactive web applications without proper security sanity checks.  Learn the mistakes, and some of the things you can do to avoid them before your&lt;br /&gt;
company commits these fatal flaws.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=59301</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=59301"/>
				<updated>2009-04-21T15:15:49Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Presentation abstracts */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: April 29th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be April 29th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by April 28th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Doing more with less? : Automate or Die - Ed Bellis, Orbitz&lt;br /&gt;
&lt;br /&gt;
7:15 Rich Internet Applications - Rafal Los&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''Doing more with less? : Automate or Die''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The harsh economic climate has hit us all in some way. Budgets are trimmed and spending is down. We are continuously asked to do more with less, but how? Certainly the attackers aren’t spending less! Our web applications continue to grow in size and complexity. So what can an InfoSec team do to become more efficient and still effectively protect our applications?&lt;br /&gt;
&lt;br /&gt;
At Orbitz, our team took a hard look at where we were spending a lot of our time – the grunt work – and how we could spend less of it. After building out a fairly comprehensive vulnerability management program and using a lot of best in breed tools, we found ourselves with an overabundance of manual labor on our hands putting together the pieces of our vulnerability puzzle. After looking around the market space, we found nothing that could really help us with this growing problem. Low and behold, there’s a government set of standards now to put all this together. What the heck, let’s build it! &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Ed Bellis is responsible for the protection and security of all information and electronic assets as well as compliance and ethics across the wide array of business units that make up Orbitz Worldwide on a global basis. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business.&lt;br /&gt;
&lt;br /&gt;
With over 15 years of experience in information security and technology, Ed has worked with and been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate Information Security for Bank of America within their Global Corporate and Investment Banking division. His credentials also include several security technology and management roles at organizations such as Ernst &amp;amp; Young, Ford Motor Company, and Young &amp;amp; Rubicam. Ed is a CISSP, CISM, a contributor to the ISM Community, and a member of ISC2, ISACA and the Chicago chapter of the ISSA.&lt;br /&gt;
&lt;br /&gt;
Ed is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as The MIS Institute, The Association of Information Technology Professionals, Technology Executives Club, and the National Business Travel Association. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''Rich Internet Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
   What does &amp;quot;Web 2.0&amp;quot; mean to your business?  If you're like most&lt;br /&gt;
companies it means publishing sites that are more interactive, more flashy,&lt;br /&gt;
more customer-catching.  To you and your developers that means using&lt;br /&gt;
technologies for creating RIA (Rich Internet Applications) like Flash and&lt;br /&gt;
AJAX and delivering as quickly as possible.  This talk focuses on some of&lt;br /&gt;
the issues that arise when those technologies are used to drive high-end,&lt;br /&gt;
interactive web applications without proper security sanity checks.  Learn&lt;br /&gt;
the mistakes, and some of the things you can do to avoid them before your&lt;br /&gt;
company commits these fatal flaws.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=59300</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=59300"/>
				<updated>2009-04-21T15:15:08Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: April 29th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be April 29th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by April 28th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Doing more with less? : Automate or Die - Ed Bellis, Orbitz&lt;br /&gt;
&lt;br /&gt;
7:15 Rich Internet Applications - Rafal Los&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''Doing more with less? : Automate or Die''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The harsh economic climate has hit us all in some way. Budgets are trimmed and spending is down. We are continuously asked to do more with less, but how? Certainly the attackers aren’t spending less! Our web applications continue to grow in size and complexity. So what can an InfoSec team do to become more efficient and still effectively protect our applications?&lt;br /&gt;
&lt;br /&gt;
At Orbitz, our team took a hard look at where we were spending a lot of our time – the grunt work – and how we could spend less of it. After building out a fairly comprehensive vulnerability management program and using a lot of best in breed tools, we found ourselves with an overabundance of manual labor on our hands putting together the pieces of our vulnerability puzzle. After looking around the market space, we found nothing that could really help us with this growing problem. Low and behold, there’s a government set of standards now to put all this together. What the heck, let’s build it! &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Ed Bellis is responsible for the protection and security of all information and electronic assets as well as compliance and ethics across the wide array of business units that make up Orbitz Worldwide on a global basis. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business.&lt;br /&gt;
&lt;br /&gt;
With over 15 years of experience in information security and technology, Ed has worked with and been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate Information Security for Bank of America within their Global Corporate and Investment Banking division. His credentials also include several security technology and management roles at organizations such as Ernst &amp;amp; Young, Ford Motor Company, and Young &amp;amp; Rubicam. Ed is a CISSP, CISM, a contributor to the ISM Community, and a member of ISC2, ISACA and the Chicago chapter of the ISSA.&lt;br /&gt;
&lt;br /&gt;
Ed is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as The MIS Institute, The Association of Information Technology Professionals, Technology Executives Club, and the National Business Travel Association. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.  &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=58806</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=58806"/>
				<updated>2009-04-12T17:26:00Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: April 29th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
==Make sure you sign up for the mailing list to receive meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be April 29th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by April 28th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Doing more with less? : Automate or Die - Ed Bellis, Orbitz&lt;br /&gt;
&lt;br /&gt;
7:10 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates, Aspect Security&lt;br /&gt;
&lt;br /&gt;
7:50 Rich Internet Applications - Rafal Los&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''Doing more with less? : Automate or Die''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The harsh economic climate has hit us all in some way. Budgets are trimmed and spending is down. We are continuously asked to do more with less, but how? Certainly the attackers aren’t spending less! Our web applications continue to grow in size and complexity. So what can an InfoSec team do to become more efficient and still effectively protect our applications?&lt;br /&gt;
&lt;br /&gt;
At Orbitz, our team took a hard look at where we were spending a lot of our time – the grunt work – and how we could spend less of it. After building out a fairly comprehensive vulnerability management program and using a lot of best in breed tools, we found ourselves with an overabundance of manual labor on our hands putting together the pieces of our vulnerability puzzle. After looking around the market space, we found nothing that could really help us with this growing problem. Low and behold, there’s a government set of standards now to put all this together. What the heck, let’s build it! &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Ed Bellis is responsible for the protection and security of all information and electronic assets as well as compliance and ethics across the wide array of business units that make up Orbitz Worldwide on a global basis. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business.&lt;br /&gt;
&lt;br /&gt;
With over 15 years of experience in information security and technology, Ed has worked with and been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate Information Security for Bank of America within their Global Corporate and Investment Banking division. His credentials also include several security technology and management roles at organizations such as Ernst &amp;amp; Young, Ford Motor Company, and Young &amp;amp; Rubicam. Ed is a CISSP, CISM, a contributor to the ISM Community, and a member of ISC2, ISACA and the Chicago chapter of the ISSA.&lt;br /&gt;
&lt;br /&gt;
Ed is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as The MIS Institute, The Association of Information Technology Professionals, Technology Executives Club, and the National Business Travel Association. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.  &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=58805</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=58805"/>
				<updated>2009-04-12T17:25:08Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
==Next Meeting: April 29th==&lt;br /&gt;
http://www.owasp.org/index.php/Chicago#tab=Chapter_Meetings&lt;br /&gt;
==Make sure you sign up for the mailing list for meeting announcements.==&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
==General Information==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
Chicago chapter meetings are hosted by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be April 29th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by April 28th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Doing more with less? : Automate or Die - Ed Bellis, Orbitz&lt;br /&gt;
&lt;br /&gt;
7:10 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates, Aspect Security&lt;br /&gt;
&lt;br /&gt;
7:50 Rich Internet Applications - Rafal Los&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''Doing more with less? : Automate or Die''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The harsh economic climate has hit us all in some way. Budgets are trimmed and spending is down. We are continuously asked to do more with less, but how? Certainly the attackers aren’t spending less! Our web applications continue to grow in size and complexity. So what can an InfoSec team do to become more efficient and still effectively protect our applications?&lt;br /&gt;
&lt;br /&gt;
At Orbitz, our team took a hard look at where we were spending a lot of our time – the grunt work – and how we could spend less of it. After building out a fairly comprehensive vulnerability management program and using a lot of best in breed tools, we found ourselves with an overabundance of manual labor on our hands putting together the pieces of our vulnerability puzzle. After looking around the market space, we found nothing that could really help us with this growing problem. Low and behold, there’s a government set of standards now to put all this together. What the heck, let’s build it! &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Ed Bellis is responsible for the protection and security of all information and electronic assets as well as compliance and ethics across the wide array of business units that make up Orbitz Worldwide on a global basis. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business.&lt;br /&gt;
&lt;br /&gt;
With over 15 years of experience in information security and technology, Ed has worked with and been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate Information Security for Bank of America within their Global Corporate and Investment Banking division. His credentials also include several security technology and management roles at organizations such as Ernst &amp;amp; Young, Ford Motor Company, and Young &amp;amp; Rubicam. Ed is a CISSP, CISM, a contributor to the ISM Community, and a member of ISC2, ISACA and the Chicago chapter of the ISSA.&lt;br /&gt;
&lt;br /&gt;
Ed is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as The MIS Institute, The Association of Information Technology Professionals, Technology Executives Club, and the National Business Travel Association. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.  &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=58804</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=58804"/>
				<updated>2009-04-12T17:22:16Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] and [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
The Chicago chapter is sponsored by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be April 29th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by April 28th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Doing more with less? : Automate or Die - Ed Bellis, Orbitz&lt;br /&gt;
&lt;br /&gt;
7:10 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates, Aspect Security&lt;br /&gt;
&lt;br /&gt;
7:50 Rich Internet Applications - Rafal Los&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''Doing more with less? : Automate or Die''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The harsh economic climate has hit us all in some way. Budgets are trimmed and spending is down. We are continuously asked to do more with less, but how? Certainly the attackers aren’t spending less! Our web applications continue to grow in size and complexity. So what can an InfoSec team do to become more efficient and still effectively protect our applications?&lt;br /&gt;
&lt;br /&gt;
At Orbitz, our team took a hard look at where we were spending a lot of our time – the grunt work – and how we could spend less of it. After building out a fairly comprehensive vulnerability management program and using a lot of best in breed tools, we found ourselves with an overabundance of manual labor on our hands putting together the pieces of our vulnerability puzzle. After looking around the market space, we found nothing that could really help us with this growing problem. Low and behold, there’s a government set of standards now to put all this together. What the heck, let’s build it! &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Ed Bellis is responsible for the protection and security of all information and electronic assets as well as compliance and ethics across the wide array of business units that make up Orbitz Worldwide on a global basis. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business.&lt;br /&gt;
&lt;br /&gt;
With over 15 years of experience in information security and technology, Ed has worked with and been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate Information Security for Bank of America within their Global Corporate and Investment Banking division. His credentials also include several security technology and management roles at organizations such as Ernst &amp;amp; Young, Ford Motor Company, and Young &amp;amp; Rubicam. Ed is a CISSP, CISM, a contributor to the ISM Community, and a member of ISC2, ISACA and the Chicago chapter of the ISSA.&lt;br /&gt;
&lt;br /&gt;
Ed is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as The MIS Institute, The Association of Information Technology Professionals, Technology Executives Club, and the National Business Travel Association. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.  &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=58803</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=58803"/>
				<updated>2009-04-12T17:17:23Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Chicago|extra=The chapter leaders are [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-chicago|emailarchives=http://lists.owasp.org/pipermail/owasp-chicago}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
The Chicago chapter is sponsored by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be April 29th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by April 28th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Welcome &lt;br /&gt;
&lt;br /&gt;
6:15 Doing more with less? : Automate or Die - Ed Bellis, Orbitz&lt;br /&gt;
&lt;br /&gt;
7:10 AppSensor: Real Time Defenses against Application Worms and Malicious Attackers - Michael Coates, Aspect Security&lt;br /&gt;
&lt;br /&gt;
7:50 Rich Internet Applications - Rafal Los&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''Doing more with less? : Automate or Die''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The harsh economic climate has hit us all in some way. Budgets are trimmed and spending is down. We are continuously asked to do more with less, but how? Certainly the attackers aren’t spending less! Our web applications continue to grow in size and complexity. So what can an InfoSec team do to become more efficient and still effectively protect our applications?&lt;br /&gt;
&lt;br /&gt;
At Orbitz, our team took a hard look at where we were spending a lot of our time – the grunt work – and how we could spend less of it. After building out a fairly comprehensive vulnerability management program and using a lot of best in breed tools, we found ourselves with an overabundance of manual labor on our hands putting together the pieces of our vulnerability puzzle. After looking around the market space, we found nothing that could really help us with this growing problem. Low and behold, there’s a government set of standards now to put all this together. What the heck, let’s build it! &lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Ed Bellis is responsible for the protection and security of all information and electronic assets as well as compliance and ethics across the wide array of business units that make up Orbitz Worldwide on a global basis. These assets include Orbitz, CheapTickets, eBookers, Away.com, HotelClub, RatesToGo, AsiaHotels, and Orbitz for Business.&lt;br /&gt;
&lt;br /&gt;
With over 15 years of experience in information security and technology, Ed has worked with and been involved in protecting information assets at several Fortune 500 companies. Prior to joining Orbitz, Ed served as VP of Corporate Information Security for Bank of America within their Global Corporate and Investment Banking division. His credentials also include several security technology and management roles at organizations such as Ernst &amp;amp; Young, Ford Motor Company, and Young &amp;amp; Rubicam. Ed is a CISSP, CISM, a contributor to the ISM Community, and a member of ISC2, ISACA and the Chicago chapter of the ISSA.&lt;br /&gt;
&lt;br /&gt;
Ed is a frequent speaker at information security events across North America and Europe. Past talks have included venues such as The MIS Institute, The Association of Information Technology Professionals, Technology Executives Club, and the National Business Travel Association. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
''AppSensor: Real Time Defenses against Application Worms and Malicious Attackers''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
The OWASP AppSensor project was created to address the lack of defensive systems within applications. Regardless if an application is secure or insecure, malicious actions should be recorded, analyzed and responded to by the system. It is unacceptable to allow an attacker unrestricted attack attempts against the application. Eventually a known or unknown vulnerability will be discovered by the attacker and exploited. AppSensor monitors attack activity and takes defensive actions such as throttling or disabling the malicious account. Behavior analysis techniques are also employed to identify application worms. Defensive techniques are described which provide real-time containment of the application worm while maintaining overall system availability.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Michael Coates is a Senior Application Security Engineer for Aspect Security and has performed numerous penetration assessments, security code reviews, and security training sessions for leading corporations worldwide. Michael is the creator and leader of the AppSensor project and is completing a Masters Degree in Computer Security from DePaul University. In past years, Michael assessed the security of GSM and WiMAX telecommunication networks, application and network systems for financial institutions and performed social engineering testing.  &lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
==== Chicago OWASP Chapter Leaders ====&lt;br /&gt;
[mailto:cory@crazypenguin.com Cory Scott]&lt;br /&gt;
&lt;br /&gt;
[mailto:jason@wittys.com Jason Witty]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=45174</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=45174"/>
				<updated>2008-10-30T17:28:35Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Chicago Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
The Chicago chapter is sponsored by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be November 13th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by November 12th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Networking / Overview of recent OWASP projects - Cory Scott&lt;br /&gt;
&lt;br /&gt;
6:15 Concurrency Attacks in Web Applications - Scott Stender, iSEC Partners&lt;br /&gt;
&lt;br /&gt;
7:15 The Seven Deadly Features of Web Applications - Matasano Security&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''Concurrency Attacks in Web Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
Modern web application frameworks are designed for developer productivity and performance. They are highly scalable, object-oriented, and can be used to create a usable web site in a matter of minutes. However, these attributes often encourage programming practices that make managing state difficult for a typical programmer. &lt;br /&gt;
&lt;br /&gt;
Web application developers must carefully manage access to all resources that can shared by threads. Global variables, session variables, back-end systems, and application-specific data stores are common examples of such resources.  &lt;br /&gt;
&lt;br /&gt;
Concurrency flaws result when access to shared resources is not managed properly - something that is easy to do when the development environment purposefully encapsulates and abstracts the resources that need to be managed!  When manipulating those resources carries a security impact, the attackers take notice.&lt;br /&gt;
&lt;br /&gt;
Each prevalent class of security flaw shares a common attribute: mistakes happen when doing the right thing is difficult.  It is our opinion that concurrency flaws, especially in the context of web applications, share this attribute.  This presentation will provide insight into the ease with which concurrency flaws can be introduced into systems, offer guidance on evaluating the security impact of such flaws, and discuss strategies for eliminating such flaws that will be helpful to developers and testers alike.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Scott Stender&lt;br /&gt;
Principal Partner, iSEC Partners&lt;br /&gt;
&lt;br /&gt;
Scott Stender is a founding partner of iSEC Partners, a strategic digital security organization. Scott brings with him several years of experience in large-scale software development and security consulting, having worked at companies such as @stake and Microsoft. Scott is a noted researcher who focuses on secure software engineering and security analysis of core technologies. He holds a BS in Computer Engineering from the University of Notre Dame.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=45105</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=45105"/>
				<updated>2008-10-30T01:07:36Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Chicago Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
The Chicago chapter is sponsored by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next quarterly Chicago OWASP Chapter meeting will be November 13th at the Bank of America Plaza, 540 W Madison Street at 6pm. Please RSVP to jason@wittys.com by November 12th so we can enter your name into the building's security system.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
6:00 Refreshments and Networking / Overview of recent OWASP projects - Cory Scott&lt;br /&gt;
&lt;br /&gt;
6:15 Concurrency Attacks in Web Applications - Scott Stender, iSEC Partners&lt;br /&gt;
&lt;br /&gt;
7:15 (Title yet to be provided) - Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
''Concurrency Attacks in Web Applications''&lt;br /&gt;
&lt;br /&gt;
ABSTRACT&lt;br /&gt;
&lt;br /&gt;
Modern web application frameworks are designed for developer productivity and performance. They are highly scalable, object-oriented, and can be used to create a usable web site in a matter of minutes. However, these attributes often encourage programming practices that make managing state difficult for a typical programmer. &lt;br /&gt;
&lt;br /&gt;
Web application developers must carefully manage access to all resources that can shared by threads. Global variables, session variables, back-end systems, and application-specific data stores are common examples of such resources.  &lt;br /&gt;
&lt;br /&gt;
Concurrency flaws result when access to shared resources is not managed properly - something that is easy to do when the development environment purposefully encapsulates and abstracts the resources that need to be managed!  When manipulating those resources carries a security impact, the attackers take notice.&lt;br /&gt;
&lt;br /&gt;
Each prevalent class of security flaw shares a common attribute: mistakes happen when doing the right thing is difficult.  It is our opinion that concurrency flaws, especially in the context of web applications, share this attribute.  This presentation will provide insight into the ease with which concurrency flaws can be introduced into systems, offer guidance on evaluating the security impact of such flaws, and discuss strategies for eliminating such flaws that will be helpful to developers and testers alike.&lt;br /&gt;
&lt;br /&gt;
SPEAKER BIO&lt;br /&gt;
&lt;br /&gt;
Scott Stender&lt;br /&gt;
Principal Partner, iSEC Partners&lt;br /&gt;
&lt;br /&gt;
Scott Stender is a founding partner of iSEC Partners, a strategic digital security organization. Scott brings with him several years of experience in large-scale software development and security consulting, having worked at companies such as @stake and Microsoft. Scott is a noted researcher who focuses on secure software engineering and security analysis of core technologies. He holds a BS in Computer Engineering from the University of Notre Dame.&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=42724</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=42724"/>
				<updated>2008-10-09T14:29:36Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Welcome to the OWASP Chicago Local Chapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Chicago Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Chicago&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
We have a mailing list at: https://lists.owasp.org/mailman/listinfo/owasp-chicago&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
The Chicago chapter is sponsored by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next Quarterly Chicago OWASP Chapter meeting will take place in November or December 2008.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=37343</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=37343"/>
				<updated>2008-08-27T01:30:56Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Chicago Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
The Chicago chapter is sponsored by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next Quarterly Chicago OWASP Chapter meeting will take place in November or December 2008.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Chicago&amp;diff=37342</id>
		<title>Chicago</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Chicago&amp;diff=37342"/>
				<updated>2008-08-27T01:24:48Z</updated>
		
		<summary type="html">&lt;p&gt;Cscott: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Welcome to the OWASP Chicago Local Chapter ==&lt;br /&gt;
&lt;br /&gt;
Anyone in our area interested in information security is welcome to attend. Our meetings are informal and encourage open discussion of all aspects of application security. We invite attendees to give short presentations about specific topics.&lt;br /&gt;
&lt;br /&gt;
If you have any questions about the Chicago chapter, please send an email to our chapter leaders [mailto:cory@crazypenguin.com Cory Scott] or [mailto:jason@wittys.com Jason Witty.]&lt;br /&gt;
&lt;br /&gt;
The Chicago chapter is sponsored by Bank of America[http://www.bankofamerica.com/]&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next Quarterly Chicago OWASP Chapter meeting will take place in November or December 2008..     &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Agenda===&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
===Presentation abstracts===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Presentation Archives ==&lt;br /&gt;
&lt;br /&gt;
Bad Cocktail: Spear Phishing - Mike Zusman - Presentation slides [https://www.owasp.org/images/6/60/Zusman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Making Money on the Web The Blackhat Way - Jeremiah Grossman - Presentation slides [https://www.owasp.org/images/2/24/Grossman_Chicago_2008.pdf here]&lt;br /&gt;
&lt;br /&gt;
Extreme Client-Side Exploitation - Nate McFeters - Presentation slides [http://www.blackhat.com/presentations/bh-usa-08/McFeters_Carter_Heasman/BH_US_08_Mcfeters_Carter_Heasman_Extreme_Client-Side_Exploitation.pdf here]&lt;br /&gt;
&lt;br /&gt;
Automated Thrash Testing - Andre Gironda - Presentation slides [http://www.owasp.org/images/3/32/Auto-thrash-testing.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Defeating Information Leak Prevention - Eric Monti - Presentation slides [https://www.owasp.org/images/4/4a/OWASP-CHI07-Defeating_Extrusion_Detection.pdf here]&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/OWASP_Chicago_Thomas_Ptacek.pdf]Webapps In Name Only'''&lt;br /&gt;
Thomas Ptacek, Matasano Security&lt;br /&gt;
&lt;br /&gt;
Where modern network architecture meets legacy application design, we get &amp;quot;The Port 80 Problem&amp;quot;: vendors wrapping every conceivable network protocol in a series of POSTs and calling them &amp;quot;safe&amp;quot;. These &amp;quot;Webapps In Name Only&amp;quot; are a nightmare for application security specialists.&lt;br /&gt;
&lt;br /&gt;
In this talk, we'll discuss, with case studies, how tools from protocol reverse engineering can be brought to bear on web application security, covering the following areas:&lt;br /&gt;
&lt;br /&gt;
- Locating and Decompiling Java and .NET Code&lt;br /&gt;
- Structure and Interpretation of Binary Protocols in HTTP&lt;br /&gt;
- Protocol Debugging Tools&lt;br /&gt;
- Web App Crypto Tricks&lt;br /&gt;
&lt;br /&gt;
'''[http://wittys.com/owasp/cscott-Stronger%20Web%20Authentication-v1.0.ppt]Token-less strong authentication for web applications: A Security Review'''&lt;br /&gt;
Cory Scott, ABN AMRO&lt;br /&gt;
&lt;br /&gt;
A short presentation on the threat models and attack vectors for token-less schemes used to reduce the risk of password-only authentication, but yet do not implement &amp;quot;true&amp;quot; two-factor technologies for logistical costs or user acceptance reasons. We'll go over how device fingerprinting and IP geo-location work and discuss the pros and cons of the solutions. &lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Illinois]]&lt;/div&gt;</summary>
		<author><name>Cscott</name></author>	</entry>

	</feed>