<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Davidribyrne%40yahoo.com</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Davidribyrne%40yahoo.com"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Davidribyrne@yahoo.com"/>
		<updated>2026-05-02T09:45:37Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=55315</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=55315"/>
				<updated>2009-02-23T17:27:22Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates at one or more hotels near the conference venue.  Please email snowfroc@owasp.org for questions regarding accomodation.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Stads&amp;diff=55314</id>
		<title>SnowFROC Abstract Stads</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Stads&amp;diff=55314"/>
				<updated>2009-02-23T17:26:54Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Adobe FLEX with BlazeDS offers developers a streamlined application development paradigm, allowing them to create rich Internet applications with little exertion. However, ease of implementation often results in incomplete engineering. In this presentation, Stadmeyer offers his assessment of the FLEX and BlazeDS application architectures as well as detailed examination of the Action Message Format version 3. Developers and administrators will be provided clear examples of how to do things wrong, how to do them right and explain exactly how each component works internally.&lt;br /&gt;
&lt;br /&gt;
While little information is available in the field regarding a FLEX application, Trustwave's security experts will share the knowledge they've gained in migrating towards a Flex application environment. Additionally, the briefing will provide information to both security assessors and developers about a technology that is soon to be prevalent, but is not yet widely understood.&lt;br /&gt;
&lt;br /&gt;
==The Speaker: Kevin Stadmeyer==&lt;br /&gt;
&lt;br /&gt;
Kevin is a Senior Security Consultant with the application security group at Trustwave and has been with the company since 2006. He has been heavily involved in the security industry since 2000 and spoke at the Blackhat USA security conference in 2008. Kevin's specialty lies in web application security and high speed parking maneuvers although he is experienced in all aspects of information security. &lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|Back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Stads&amp;diff=55313</id>
		<title>SnowFROC Abstract Stads</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Stads&amp;diff=55313"/>
				<updated>2009-02-23T17:26:26Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: New page: ==The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;==  Adobe FLEX with BlazeDS offers developers a streamlined application development paradigm, allowing them ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Adobe FLEX with BlazeDS offers developers a streamlined application development paradigm, allowing them to create rich Internet applications with little exertion. However, ease of implementation often results in incomplete engineering. In this presentation, Stadmeyer offers his assessment of the FLEX and BlazeDS application architectures as well as detailed examination of the Action Message Format version 3. Developers and administrators will be provided clear examples of how to do things wrong, how to do them right and explain exactly how each component works internally.&lt;br /&gt;
&lt;br /&gt;
While little information is available in the field regarding a FLEX application, Trustwave's security experts will share the knowledge they've gained in migrating towards a Flex application environment. Additionally, the briefing will provide information to both security assessors and developers about a technology that is soon to be prevalent, but is not yet widely understood.&lt;br /&gt;
&lt;br /&gt;
==The Speaker: Kevin Stadmeyer==&lt;br /&gt;
&lt;br /&gt;
Kevin is a Senior Security Consultant with the application security group at Trustwave and has been with the company since 2006. He has been heavily involved in the security industry since 2000 and spoke at the Blackhat USA security conference in 2008. Kevin's specialty lies in web application security and high speed parking maneuvers although he is experienced in all aspects of information security. &lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|Back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=55312</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=55312"/>
				<updated>2009-02-23T17:21:37Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Stads|&amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot;]] (Tool Release!) &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates at one or more hotels near the conference venue.  Please email snowfroc@owasp.org for questions regarding accomodation.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54905</id>
		<title>SnowFROC Abstract Byrne</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54905"/>
				<updated>2009-02-18T20:08:17Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Automated application security tools have been available for quite a while, but their manual counterparts are still doing quite well. This presentation will cover the relative strengths and weaknesses of both automated solutions, such as Web Application Firewalls (WAFs), source code review tools, and automated application scanners, and manual approaches, namely application penetration tests and manual code reviews. The presentation will conclude that automated tools are well suited for lower-priority applications, but manual analysis is important for critical applications. &lt;br /&gt;
&lt;br /&gt;
Automated tools certainly have some strengths (namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks). In addition to preventing some attacks, WAFs also have advantages for some compliance frameworks. However, automated solutions are far from perfect. To begin with, there are entire classes of very important vulnerabilities that are theoretically impossible for automated software to detect (at least until HAL comes online). Examples include complex information leakage, race conditions, logic flaws, design flaws, subjective vulnerabilities such as CSRF, and multistage process attacks. &lt;br /&gt;
&lt;br /&gt;
Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. Automated tools are designed to cover common application designs and platforms. Applications using an unusual layout or components will not be thoroughly protected by automated tools. Realistically, only the most vanilla of web applications written on common, simple platforms will receive solid code coverage from an automated tool. &lt;br /&gt;
&lt;br /&gt;
On the other hand, manual testing is far more versatile. An experienced penetration tester can identify complicated vulnerabilities in the same way that an attacker does. Specific, real-world examples of vulnerabilities only recognizable by humans will be provided. The diversity of vulnerabilities shown will clearly demonstrate that all applications have the potential for significant vulnerabilities not detectible by automated tools.&lt;br /&gt;
&lt;br /&gt;
Manual source code reviews present even more benefits by identifying vulnerabilities that require access to source code. Examples include “hidden” or unused application components, SQL injection with no evidence in the response, exotic injection attacks (e.g. mainframe session attacks), vulnerabilities in back-end systems, and intentional backdoors. Many organizations assume that this type of vulnerability is not a large threat, but source code can be obtained by disgruntled developers, by internal attackers when the repository isn’t properly secured, by exploiting platform bugs or path directory traversal attacks, and by external attackers using a Trojan horse or similar technique.&lt;br /&gt;
&lt;br /&gt;
==The Speakers: Charles Henderson &amp;amp; David Byrne==&lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Penetration Testing and Code Review Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
David Byrne has almost a decade of experience in information security, specializing in web application penetration testing. Currently, he is a Senior Security Consultant in Trustwave’s SpideLabs division. Before joining Trustwave, David was the Security Architect at Dish Network. In addition to penetration testing, David has extensive experience working with developers and implementers to design security controls into applications from the ground up. He also has worked with governance and compliance groups to create security policies and standards documents.&lt;br /&gt;
&lt;br /&gt;
In 2006, David started the Denver chapter of OWASP. In 2008, he released Grendel (grendel-scan.com), an open source web application security scanner. David has spoken at many industry events, including Black Hat, DEFCON, Toorcon, and the Computer Security Institute’s annual conference. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|Back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54904</id>
		<title>Front Range OWASP Conference 2009</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Front_Range_OWASP_Conference_2009&amp;diff=54904"/>
				<updated>2009-02-18T20:08:05Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Image:SnowFROCblue.jpg]]&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Welcome to SnowFROC, the Winter 2009 Front Range OWASP Application Security Conference!&lt;br /&gt;
&lt;br /&gt;
After a successful FROC in June of 2008, we are back in Denver, Colorado USA on 5 March 2009! &lt;br /&gt;
&lt;br /&gt;
'''This year we again present a full day, FREE multi-track conference, which will provide valuable information for managers and executives as well as developers and engineers.'''&lt;br /&gt;
&lt;br /&gt;
In 2008, we attracted a packed venue with our great AppSec speakers, and we hope to achieve the same again in 2009.  This year we organized the conference to occur during the peak of the [http://www.google.com/search?q=colorado+skiing Colorado ski season], so that speakers can head up to the nearby mountains before and/or after the conference to enjoy some of the legendary snow.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Conference Location==&lt;br /&gt;
[[Image:Denver_mountains.JPG]]&lt;br /&gt;
&lt;br /&gt;
This year, the conference will be held at the Tivoli Student Union in downtown Denver, CO.&lt;br /&gt;
&lt;br /&gt;
==Call for Presentations==&lt;br /&gt;
The [[Front_Range_OWASP_Conference_2009_CFP|call for papers]] closed on 6 Feb 09.  We received a tremendous response.  Thanks to everybody who responded!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- ===[[SnowFROC Tentative Schedule]]=== --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Agenda and Presentations: 5 March 2009==&lt;br /&gt;
&lt;br /&gt;
The agenda follows the successful OWASP conference two tracks format, with opening keynotes and presentations in the main auditorium, split tracks in the middle of the day, and closing panel discussions back in the main auditorium.&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | March 5, 2009&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Registration and Continental Breakfast in the Sponsor Expo Room&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:30-08:35 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Welcome to SnowFROC AppSec 2009 Conference &lt;br /&gt;
''David Campbell, OWASP Denver''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:35-09:45 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | Keynote: [[SnowFROC_Abstract_Grossman|&amp;quot;Top Ten Web Hacking Techniques of 2008: What's possible, not probable&amp;quot;]]&lt;br /&gt;
''Jeremiah Grossman, Whitehat Security''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:45-10:15 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP State of the Union&lt;br /&gt;
''Tom Brennan, OWASP Board''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:15-10:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:30-11:15 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;[[sfroc_bellis_abstract|Doing More with Less: Automate or Die]]&amp;quot;&lt;br /&gt;
''Ed Bellis, Orbitz''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Zusman|&amp;quot;Poor Man's Guide to Breaking PKI: Why You Don't Need 200 Playstations&amp;quot;]]&lt;br /&gt;
''Mike Zusman, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:15-12:00 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Paller|&amp;quot;A Legal Minimum Standard of Due Care: The CAG and the Top 25 Most Dangerous Programming Errors&amp;quot;]]&lt;br /&gt;
''Alan Paller, SANS''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Adobe Flex, AMF 3 and BlazeDS: An Assessment&amp;quot; (Tool Release!) &lt;br /&gt;
''Kevin Stadmeyer, Trustwave''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:40%; background:#BC857A&amp;quot; | Management / Executive Track: Room 1&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; | Deep Technical Track: Room 2&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Peloquin|&amp;quot;Building an Effective Application Security Program&amp;quot;]]&lt;br /&gt;
''Joey Peloquin, Fishnet Security''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Belani|&amp;quot;Bad Cocktail: Spear Phishing + Application Hacks&amp;quot;]]&lt;br /&gt;
''Rohyt Belani, Intrepidus Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:50-14:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Byrne|&amp;quot;Automated vs. Manual Security: You can't filter The Stupid&amp;quot;]]&lt;br /&gt;
''David Byrne &amp;amp; Charles Henderson, Trustwave''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Damele|&amp;quot;SQL injection: Not only AND 1=1&amp;quot;]]&lt;br /&gt;
''Bernardo Damele Assumpcao Guimaraes, Portcullis Computer Security Ltd.''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:50-15:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:50 || style=&amp;quot;width:40%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Abstract_Neucom|&amp;quot;Security Policy Management: Best Practices for Web Services and Application Security&amp;quot;]]&lt;br /&gt;
''Ray Neucom, IBM''&lt;br /&gt;
 | style=&amp;quot;width:40%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[SnowFROC_Cornell_Dickson_Abstract|&amp;quot;Vulnerability Management in an Application Security World&amp;quot;]]&lt;br /&gt;
''Dan Cornell &amp;amp; John Dickson, Denim Group''&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:50-16:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Panel: Emerging Threats and Enterprise Countermeasures&lt;br /&gt;
Moderator: John Dickson&amp;lt;br/&amp;gt;&lt;br /&gt;
Panelists: Alan Paller, Joey Peloquin, Rohyt Belani, Ed Bellis, Laz, Ray Neucom&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:30-17:30 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:40%; background:#F2F2F2&amp;quot; align=&amp;quot;left&amp;quot; | Conference Wrap Up, CTF Awards &amp;amp; Sponsor Raffles - CTF - Beatz by [http://www.dj-jackalope.com/ DJ Jackalope] &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:30-21:00 || colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Social Gathering: Dinner and Drinks @ TBD&lt;br /&gt;
 |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!-- Back to [https://www.owasp.org/index.php/Front_Range_OWASP_Conference_2009 SnowFROC Home] --&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Logistics==&lt;br /&gt;
&lt;br /&gt;
Venue: [http://www.tivoli.org/tivoli/ Tivoli Student Union, Denver, CO USA]&lt;br /&gt;
&lt;br /&gt;
==Accommodations==&lt;br /&gt;
&lt;br /&gt;
OWASP negotiated discounted rates at one or more hotels near the conference venue.  Please email snowfroc@owasp.org for questions regarding accomodation.&lt;br /&gt;
&lt;br /&gt;
==Transportation to the Conference==&lt;br /&gt;
===By plane===&lt;br /&gt;
Denver can be reached by commercial aviation through the [http://www.flydenver.com/ Denver International Airport], which is a hub for United Airlines as well as Frontier.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===How to get to the venue?===&lt;br /&gt;
See the [http://maps.google.com/maps?f=q&amp;amp;hl=en&amp;amp;q=tivoli+denver&amp;amp;ie=UTF8&amp;amp;ll=39.74785,-104.990931&amp;amp;spn=0.040189,0.061626&amp;amp;z=14&amp;amp;iwloc=A map].&lt;br /&gt;
&lt;br /&gt;
By taxi:&lt;br /&gt;
*taxi from the airport to venue is about $50 USD&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Registration and Conference Fees==&lt;br /&gt;
&lt;br /&gt;
Due to the hard work of our organizers and the gracious support of our sponsors, SNOWFROC will once again be a FREE CONFERENCE!!!&lt;br /&gt;
&lt;br /&gt;
Despite the fact that this is a free conference, we still need you to register to ensure that we don't exceed venue capacity.&lt;br /&gt;
&lt;br /&gt;
[https://snowfroc.electricalchemy.net CLICK HERE TO REGISTER]&lt;br /&gt;
&lt;br /&gt;
==Conference Committee==&lt;br /&gt;
&lt;br /&gt;
OWASP Conferences Chair: Dave Wichers - Aspect Security - dave.wichers 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
SNOWFROC 2009 Planning Committee Chair: Kathy Thaxton -  kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Colorado Chapter Hosts:&lt;br /&gt;
* David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
* Eric Duprey - OWASP Denver - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
Vendor Exhibition Chair: Kathy Thaxton - kthaxton 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
Capture the Flag Chair: Eric Duprey - eduprey 'at' exploits.org&lt;br /&gt;
&lt;br /&gt;
CFP Chair: David Campbell - OWASP Denver - dcampbell 'at' owasp.org&lt;br /&gt;
&lt;br /&gt;
==[[OWASP AppSec Conference Sponsors | Conference Sponsors]]==&lt;br /&gt;
&lt;br /&gt;
The following organizations are proud sponsors of this conference:&lt;br /&gt;
*Accuvant&lt;br /&gt;
*Breach&lt;br /&gt;
*Business Partner Solutions&lt;br /&gt;
*Denim Group&lt;br /&gt;
&amp;lt;!-- *Dirsec --&amp;gt;&lt;br /&gt;
*Fishnet Security&lt;br /&gt;
&amp;lt;!-- *Fortify --&amp;gt;&lt;br /&gt;
*IBM&lt;br /&gt;
*Imperva&lt;br /&gt;
*Laz&lt;br /&gt;
*Lares&lt;br /&gt;
&amp;lt;!-- *Symplify --&amp;gt;&lt;br /&gt;
*Trustwave&lt;br /&gt;
*WhiteHat Security&lt;br /&gt;
&lt;br /&gt;
If you are interested in sponsoring this OWASP conference, please contact Kathy Thaxton at kthaxton 'at' owasp.org.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
More information about conference sponsorship is available [[OWASP AppSec Conference Sponsors | here]].&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP AppSec Conference]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54903</id>
		<title>SnowFROC Abstract Byrne</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54903"/>
				<updated>2009-02-18T20:07:04Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* The Speakers: David Byrne &amp;amp; Charles Henderson */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Automated application security tools have been available for quite a while, but their manual counterparts are still doing quite well. This presentation will cover the relative strengths and weaknesses of both automated solutions, such as Web Application Firewalls (WAFs), source code review tools, and automated application scanners, and manual approaches, namely application penetration tests and manual code reviews. The presentation will conclude that automated tools are well suited for lower-priority applications, but manual analysis is important for critical applications. &lt;br /&gt;
&lt;br /&gt;
Automated tools certainly have some strengths (namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks). In addition to preventing some attacks, WAFs also have advantages for some compliance frameworks. However, automated solutions are far from perfect. To begin with, there are entire classes of very important vulnerabilities that are theoretically impossible for automated software to detect (at least until HAL comes online). Examples include complex information leakage, race conditions, logic flaws, design flaws, subjective vulnerabilities such as CSRF, and multistage process attacks. &lt;br /&gt;
&lt;br /&gt;
Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. Automated tools are designed to cover common application designs and platforms. Applications using an unusual layout or components will not be thoroughly protected by automated tools. Realistically, only the most vanilla of web applications written on common, simple platforms will receive solid code coverage from an automated tool. &lt;br /&gt;
&lt;br /&gt;
On the other hand, manual testing is far more versatile. An experienced penetration tester can identify complicated vulnerabilities in the same way that an attacker does. Specific, real-world examples of vulnerabilities only recognizable by humans will be provided. The diversity of vulnerabilities shown will clearly demonstrate that all applications have the potential for significant vulnerabilities not detectible by automated tools.&lt;br /&gt;
&lt;br /&gt;
Manual source code reviews present even more benefits by identifying vulnerabilities that require access to source code. Examples include “hidden” or unused application components, SQL injection with no evidence in the response, exotic injection attacks (e.g. mainframe session attacks), vulnerabilities in back-end systems, and intentional backdoors. Many organizations assume that this type of vulnerability is not a large threat, but source code can be obtained by disgruntled developers, by internal attackers when the repository isn’t properly secured, by exploiting platform bugs or path directory traversal attacks, and by external attackers using a Trojan horse or similar technique.&lt;br /&gt;
&lt;br /&gt;
==The Speakers: Charles Henderson &amp;amp; David Byrne==&lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Penetration Testing and Code Review Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
David Byrne has almost a decade of experience in information security, specializing in web application penetration testing. Currently, he is a Senior Security Consultant in Trustwave’s SpideLabs division. Before joining Trustwave, David was the Security Architect at Dish Network. In addition to penetration testing, David has extensive experience working with developers and implementers to design security controls into applications from the ground up. He also has worked with governance and compliance groups to create security policies and standards documents.&lt;br /&gt;
&lt;br /&gt;
In 2006, David started the Denver chapter of OWASP. In 2008, he released Grendel (grendel-scan.com), an open source web application security scanner. David has spoken at many industry events, including Black Hat, DEFCON, Toorcon, and the Computer Security Institute’s annual conference. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|Back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54902</id>
		<title>SnowFROC Abstract Byrne</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54902"/>
				<updated>2009-02-18T20:06:45Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* The Speakers: David Byrne &amp;amp; Charles Henderson */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Automated application security tools have been available for quite a while, but their manual counterparts are still doing quite well. This presentation will cover the relative strengths and weaknesses of both automated solutions, such as Web Application Firewalls (WAFs), source code review tools, and automated application scanners, and manual approaches, namely application penetration tests and manual code reviews. The presentation will conclude that automated tools are well suited for lower-priority applications, but manual analysis is important for critical applications. &lt;br /&gt;
&lt;br /&gt;
Automated tools certainly have some strengths (namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks). In addition to preventing some attacks, WAFs also have advantages for some compliance frameworks. However, automated solutions are far from perfect. To begin with, there are entire classes of very important vulnerabilities that are theoretically impossible for automated software to detect (at least until HAL comes online). Examples include complex information leakage, race conditions, logic flaws, design flaws, subjective vulnerabilities such as CSRF, and multistage process attacks. &lt;br /&gt;
&lt;br /&gt;
Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. Automated tools are designed to cover common application designs and platforms. Applications using an unusual layout or components will not be thoroughly protected by automated tools. Realistically, only the most vanilla of web applications written on common, simple platforms will receive solid code coverage from an automated tool. &lt;br /&gt;
&lt;br /&gt;
On the other hand, manual testing is far more versatile. An experienced penetration tester can identify complicated vulnerabilities in the same way that an attacker does. Specific, real-world examples of vulnerabilities only recognizable by humans will be provided. The diversity of vulnerabilities shown will clearly demonstrate that all applications have the potential for significant vulnerabilities not detectible by automated tools.&lt;br /&gt;
&lt;br /&gt;
Manual source code reviews present even more benefits by identifying vulnerabilities that require access to source code. Examples include “hidden” or unused application components, SQL injection with no evidence in the response, exotic injection attacks (e.g. mainframe session attacks), vulnerabilities in back-end systems, and intentional backdoors. Many organizations assume that this type of vulnerability is not a large threat, but source code can be obtained by disgruntled developers, by internal attackers when the repository isn’t properly secured, by exploiting platform bugs or path directory traversal attacks, and by external attackers using a Trojan horse or similar technique.&lt;br /&gt;
&lt;br /&gt;
==The Speakers: David Byrne &amp;amp; Charles Henderson==&lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Penetration Testing and Code Review Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
David Byrne has almost a decade of experience in information security, specializing in web application penetration testing. Currently, he is a Senior Security Consultant in Trustwave’s SpideLabs division. Before joining Trustwave, David was the Security Architect at Dish Network. In addition to penetration testing, David has extensive experience working with developers and implementers to design security controls into applications from the ground up. He also has worked with governance and compliance groups to create security policies and standards documents.&lt;br /&gt;
&lt;br /&gt;
In 2006, David started the Denver chapter of OWASP. In 2008, he released Grendel (grendel-scan.com), an open source web application security scanner. David has spoken at many industry events, including Black Hat, DEFCON, Toorcon, and the Computer Security Institute’s annual conference. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|Back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54901</id>
		<title>SnowFROC Abstract Byrne</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54901"/>
				<updated>2009-02-18T20:06:03Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* The Speakers: David Byrne &amp;amp; Charles Henderson */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Automated application security tools have been available for quite a while, but their manual counterparts are still doing quite well. This presentation will cover the relative strengths and weaknesses of both automated solutions, such as Web Application Firewalls (WAFs), source code review tools, and automated application scanners, and manual approaches, namely application penetration tests and manual code reviews. The presentation will conclude that automated tools are well suited for lower-priority applications, but manual analysis is important for critical applications. &lt;br /&gt;
&lt;br /&gt;
Automated tools certainly have some strengths (namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks). In addition to preventing some attacks, WAFs also have advantages for some compliance frameworks. However, automated solutions are far from perfect. To begin with, there are entire classes of very important vulnerabilities that are theoretically impossible for automated software to detect (at least until HAL comes online). Examples include complex information leakage, race conditions, logic flaws, design flaws, subjective vulnerabilities such as CSRF, and multistage process attacks. &lt;br /&gt;
&lt;br /&gt;
Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. Automated tools are designed to cover common application designs and platforms. Applications using an unusual layout or components will not be thoroughly protected by automated tools. Realistically, only the most vanilla of web applications written on common, simple platforms will receive solid code coverage from an automated tool. &lt;br /&gt;
&lt;br /&gt;
On the other hand, manual testing is far more versatile. An experienced penetration tester can identify complicated vulnerabilities in the same way that an attacker does. Specific, real-world examples of vulnerabilities only recognizable by humans will be provided. The diversity of vulnerabilities shown will clearly demonstrate that all applications have the potential for significant vulnerabilities not detectible by automated tools.&lt;br /&gt;
&lt;br /&gt;
Manual source code reviews present even more benefits by identifying vulnerabilities that require access to source code. Examples include “hidden” or unused application components, SQL injection with no evidence in the response, exotic injection attacks (e.g. mainframe session attacks), vulnerabilities in back-end systems, and intentional backdoors. Many organizations assume that this type of vulnerability is not a large threat, but source code can be obtained by disgruntled developers, by internal attackers when the repository isn’t properly secured, by exploiting platform bugs or path directory traversal attacks, and by external attackers using a Trojan horse or similar technique.&lt;br /&gt;
&lt;br /&gt;
==The Speakers: David Byrne &amp;amp; Charles Henderson==&lt;br /&gt;
&lt;br /&gt;
David Byrne has almost a decade of experience in information security, specializing in web application penetration testing. Currently, he is a Senior Security Consultant in Trustwave’s SpideLabs division. Before joining Trustwave, David was the Security Architect at Dish Network. In addition to penetration testing, David has extensive experience working with developers and implementers to design security controls into applications from the ground up. He also has worked with governance and compliance groups to create security policies and standards documents.&lt;br /&gt;
&lt;br /&gt;
In 2006, David started the Denver chapter of OWASP. In 2008, he released Grendel (grendel-scan.com), an open source web application security scanner. David has spoken at many industry events, including Black Hat, DEFCON, Toorcon, and the Computer Security Institute’s annual conference. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Penetration Testing and Code Review Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing.&lt;br /&gt;
&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|Back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54900</id>
		<title>SnowFROC Abstract Byrne</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54900"/>
				<updated>2009-02-18T20:04:46Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot; */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Automated application security tools have been available for quite a while, but their manual counterparts are still doing quite well. This presentation will cover the relative strengths and weaknesses of both automated solutions, such as Web Application Firewalls (WAFs), source code review tools, and automated application scanners, and manual approaches, namely application penetration tests and manual code reviews. The presentation will conclude that automated tools are well suited for lower-priority applications, but manual analysis is important for critical applications. &lt;br /&gt;
&lt;br /&gt;
Automated tools certainly have some strengths (namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks). In addition to preventing some attacks, WAFs also have advantages for some compliance frameworks. However, automated solutions are far from perfect. To begin with, there are entire classes of very important vulnerabilities that are theoretically impossible for automated software to detect (at least until HAL comes online). Examples include complex information leakage, race conditions, logic flaws, design flaws, subjective vulnerabilities such as CSRF, and multistage process attacks. &lt;br /&gt;
&lt;br /&gt;
Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. Automated tools are designed to cover common application designs and platforms. Applications using an unusual layout or components will not be thoroughly protected by automated tools. Realistically, only the most vanilla of web applications written on common, simple platforms will receive solid code coverage from an automated tool. &lt;br /&gt;
&lt;br /&gt;
On the other hand, manual testing is far more versatile. An experienced penetration tester can identify complicated vulnerabilities in the same way that an attacker does. Specific, real-world examples of vulnerabilities only recognizable by humans will be provided. The diversity of vulnerabilities shown will clearly demonstrate that all applications have the potential for significant vulnerabilities not detectible by automated tools.&lt;br /&gt;
&lt;br /&gt;
Manual source code reviews present even more benefits by identifying vulnerabilities that require access to source code. Examples include “hidden” or unused application components, SQL injection with no evidence in the response, exotic injection attacks (e.g. mainframe session attacks), vulnerabilities in back-end systems, and intentional backdoors. Many organizations assume that this type of vulnerability is not a large threat, but source code can be obtained by disgruntled developers, by internal attackers when the repository isn’t properly secured, by exploiting platform bugs or path directory traversal attacks, and by external attackers using a Trojan horse or similar technique.&lt;br /&gt;
&lt;br /&gt;
==The Speakers: David Byrne &amp;amp; Charles Henderson==&lt;br /&gt;
&lt;br /&gt;
David Byrne has almost a decade of experience in information security, specializing in web application penetration testing. Currently, he is a Senior Security Consultant in Trustwave’s SpideLabs division. Before joining Trustwave, David was the Security Architect at Dish Network. In addition to penetration testing, David has extensive experience working with developers and implementers to design security controls into applications from the ground up. He also has worked with governance and compliance groups to create security policies and standards documents.&lt;br /&gt;
&lt;br /&gt;
In 2006, David started the Denver chapter of OWASP. In 2008, he released Grendel (grendel-scan.com), an open source web application security scanner. David has spoken at many industry events, including Black Hat, DEFCON, Toorcon, and the Computer Security Institute’s annual conference. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Penetration Testing and Code Review Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing.&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54899</id>
		<title>SnowFROC Abstract Byrne</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SnowFROC_Abstract_Byrne&amp;diff=54899"/>
				<updated>2009-02-18T20:04:25Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==The Presentation: &amp;quot;Automated vs. Manual Security: You can't filter the stupid&amp;quot;==&lt;br /&gt;
&lt;br /&gt;
Automated application security tools have been available for quite a while, but their manual counterparts are still doing quite well. This presentation will cover the relative strengths and weaknesses of both automated solutions, such as Web Application Firewalls (WAFs), source code review tools, and automated application scanners, and manual approaches, namely application penetration tests and manual code reviews. The presentation will conclude that automated tools are well suited for lower-priority applications, but manual analysis is important for critical applications. &lt;br /&gt;
Automated tools certainly have some strengths (namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks). In addition to preventing some attacks, WAFs also have advantages for some compliance frameworks. However, automated solutions are far from perfect. To begin with, there are entire classes of very important vulnerabilities that are theoretically impossible for automated software to detect (at least until HAL comes online). Examples include complex information leakage, race conditions, logic flaws, design flaws, subjective vulnerabilities such as CSRF, and multistage process attacks. &lt;br /&gt;
Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. Automated tools are designed to cover common application designs and platforms. Applications using an unusual layout or components will not be thoroughly protected by automated tools. Realistically, only the most vanilla of web applications written on common, simple platforms will receive solid code coverage from an automated tool. &lt;br /&gt;
On the other hand, manual testing is far more versatile. An experienced penetration tester can identify complicated vulnerabilities in the same way that an attacker does. Specific, real-world examples of vulnerabilities only recognizable by humans will be provided. The diversity of vulnerabilities shown will clearly demonstrate that all applications have the potential for significant vulnerabilities not detectible by automated tools.&lt;br /&gt;
Manual source code reviews present even more benefits by identifying vulnerabilities that require access to source code. Examples include “hidden” or unused application components, SQL injection with no evidence in the response, exotic injection attacks (e.g. mainframe session attacks), vulnerabilities in back-end systems, and intentional backdoors. Many organizations assume that this type of vulnerability is not a large threat, but source code can be obtained by disgruntled developers, by internal attackers when the repository isn’t properly secured, by exploiting platform bugs or path directory traversal attacks, and by external attackers using a Trojan horse or similar technique.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==The Speakers: David Byrne &amp;amp; Charles Henderson==&lt;br /&gt;
&lt;br /&gt;
David Byrne has almost a decade of experience in information security, specializing in web application penetration testing. Currently, he is a Senior Security Consultant in Trustwave’s SpideLabs division. Before joining Trustwave, David was the Security Architect at Dish Network. In addition to penetration testing, David has extensive experience working with developers and implementers to design security controls into applications from the ground up. He also has worked with governance and compliance groups to create security policies and standards documents.&lt;br /&gt;
&lt;br /&gt;
In 2006, David started the Denver chapter of OWASP. In 2008, he released Grendel (grendel-scan.com), an open source web application security scanner. David has spoken at many industry events, including Black Hat, DEFCON, Toorcon, and the Computer Security Institute’s annual conference. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Charles Henderson has been in the security industry for over 15 years and manages the Application Penetration Testing and Code Review Practice at Trustwave. He has specialized in application security testing and application security assessment throughout his career but has also worked in physical security testing and network security testing.&lt;br /&gt;
[[Front_Range_OWASP_Conference_2009#Agenda_and_Presentations:_5_March_2009|back to Presentation Agenda]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=37145</id>
		<title>Appendix A: Testing Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Appendix_A:_Testing_Tools&amp;diff=37145"/>
				<updated>2008-08-25T04:59:31Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP Testing Guide v3}}&lt;br /&gt;
&lt;br /&gt;
==Open Source Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
* '''OWASP WebScarab''' - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* '''OWASP CAL9000''' - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br&amp;gt;&lt;br /&gt;
** CAL9000 is a collection of browser-based tools that enable more effective and efficient manual testing efforts. Includes an XSS Attack Library, Character Encoder/Decoder, HTTP Request Generator and Response Evaluator, Testing Checklist, Automated Attack Editor and much more. &lt;br /&gt;
&lt;br /&gt;
* '''OWASP Pantera''' - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* SPIKE - http://www.immunitysec.com&lt;br /&gt;
* Paros - http://www.parosproxy.org&lt;br /&gt;
* Burp Proxy - http://www.portswigger.net&lt;br /&gt;
* Achilles Proxy - http://www.mavensecurity.com/achilles&lt;br /&gt;
* Odysseus Proxy - http://www.wastelands.gen.nz/odysseus/&lt;br /&gt;
* Webstretch Proxy - http://sourceforge.net/projects/webstretch&amp;lt;br&amp;gt;&lt;br /&gt;
* Firefox LiveHTTPHeaders, Tamper Data and Developer Tools- http://www.mozdev.org&lt;br /&gt;
* Sensepost Wikto (Google cached fault-finding) - http://www.sensepost.com/research/wikto/index2.html&lt;br /&gt;
* Grendel-Scan - http://www.grendel-scan.com&lt;br /&gt;
&lt;br /&gt;
=== Testing for specific vulnerabilities ===&lt;br /&gt;
&lt;br /&gt;
'''Testing AJAX '''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP SPRAJAX - http://www.owasp.org/index.php/Category:OWASP_Sprajax_Project&lt;br /&gt;
'''Testing for SQL Injection '''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&lt;br /&gt;
* Multiple DBMS Sql Injection tool - [SQL Power Injector]&lt;br /&gt;
* MySql Blind Injection Bruteforcing, Reversing.org - [sqlbftools]&lt;br /&gt;
* Antonio Parata: Dump Files by sql inference on Mysql - [SqlDumper]&lt;br /&gt;
* Sqlninja: a SQL Server Injection&amp;amp;Takeover Tool - http://sqlninja.sourceforge.net &lt;br /&gt;
* Bernardo Damele and Daniele Bellucci: sqlmap, a blind SQL injection tool - http://sqlmap.sourceforge.net/&lt;br /&gt;
* Absinthe 1.1 (formerly SQLSqueal) - http://www.0x90.org/releases/absinthe/&amp;lt;br&amp;gt;&lt;br /&gt;
* SQLInjector - http://www.databasesecurity.com/sql-injector.htm&lt;br /&gt;
* bsqlbf-1.2-th - http://www.514.es &amp;lt;br&amp;gt;&lt;br /&gt;
'''Testing Oracle'''&lt;br /&gt;
* TNS Listener tool (Perl) - http://www.jammed.com/%7Ejwa/hacks/security/tnscmd/tnscmd-doc.html&lt;br /&gt;
* Toad for Oracle - http://www.quest.com/toad &lt;br /&gt;
'''Testing SSL '''&amp;lt;br&amp;gt;&lt;br /&gt;
* Foundstone SSL Digger - http://www.foundstone.com/resources/proddesc/ssldigger.htm&lt;br /&gt;
'''Testing for Brute Force Password'''&lt;br /&gt;
* THC Hydra - http://www.thc.org/thc-hydra/&lt;br /&gt;
* John the Ripper - http://www.openwall.com/john/&lt;br /&gt;
* Brutus - http://www.hoobie.net/brutus/ &lt;br /&gt;
* Medusa - http://www.foofus.net/~jmk/medusa/medusa.html&lt;br /&gt;
'''Testing for HTTP Methods'''&lt;br /&gt;
* NetCat - http://www.vulnwatch.org/netcat&lt;br /&gt;
'''Testing Buffer Overflow'''&lt;br /&gt;
*  OllyDbg: &amp;quot;A windows based debugger used for analyzing buffer overflow vulnerabilities&amp;quot; - http://www.ollydbg.de&lt;br /&gt;
* Spike, A fuzzer framework that can be used to explore vulnerabilities and perform length testing - http://www.immunitysec.com/downloads/SPIKE2.9.tgz&lt;br /&gt;
* Brute Force Binary Tester (BFB), A proactive binary checker - http://bfbtester.sourceforge.net/&lt;br /&gt;
* Metasploit, A rapid exploit development and Testing frame work - http://www.metasploit.com/projects/Framework/ &lt;br /&gt;
'''Fuzzer'''&amp;lt;br&amp;gt;&lt;br /&gt;
* OWASP WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&lt;br /&gt;
'''Googling'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Foundstone Sitedigger (Google cached fault-finding) - http://www.foundstone.com/resources/proddesc/sitedigger.htm&lt;br /&gt;
&lt;br /&gt;
==Commercial Black Box Testing tools==&lt;br /&gt;
&lt;br /&gt;
* Typhon - http://www.ngssoftware.com/products/internet-security/ngs-typhon.php&lt;br /&gt;
* NGSSQuirreL - http://www.ngssoftware.com/products/database-security/&lt;br /&gt;
* Watchfire AppScan - http://www.watchfire.com&lt;br /&gt;
* Cenzic Hailstorm - http://www.cenzic.com/products_services/cenzic_hailstorm.php&amp;lt;br&amp;gt;&lt;br /&gt;
* SPI Dynamics WebInspect - http://www.spidynamics.com&lt;br /&gt;
* Burp Intruder - http://portswigger.net/intruder&amp;lt;br&amp;gt;&lt;br /&gt;
* Acunetix Web Vulnerability Scanner - http://www.acunetix.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* ScanDo - http://www.kavado.com&lt;br /&gt;
* WebSleuth - http://www.sandsprite.com&lt;br /&gt;
* NT Objectives NTOSpider - http://www.ntobjectives.com/products/ntospider.php&amp;lt;br&amp;gt;&lt;br /&gt;
* Fortify Pen Testing Team Tool - http://www.fortifysoftware.com/products/tester&amp;lt;br&amp;gt;&lt;br /&gt;
* Sandsprite Web Sleuth - http://sandsprite.com/Sleuth/&amp;lt;br&amp;gt;&lt;br /&gt;
* MaxPatrol Security Scanner - http://www.maxpatrol.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* Ecyware GreenBlue Inspector - http://www.ecyware.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* Parasoft WebKing (more QA-type tool)&amp;lt;br&amp;gt;&lt;br /&gt;
* MatriXay - http://www.dbappsecurity.com/&amp;lt;br&amp;gt;&lt;br /&gt;
* N-Stalker Web Application Security Scanner - http://www.nstalker.com/&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Source Code Analyzers==&lt;br /&gt;
&lt;br /&gt;
===Open Source / Freeware===&lt;br /&gt;
&lt;br /&gt;
* '''OWASP LAPSE''' - http://www.owasp.org/index.php/Category:OWASP_LAPSE_Project&lt;br /&gt;
* PMD - http://pmd.sourceforge.net/&lt;br /&gt;
* FlawFinder - http://www.dwheeler.com/flawfinder&lt;br /&gt;
* Microsoft’s [[FxCop]]&lt;br /&gt;
* Splint - http://splint.org&lt;br /&gt;
* Boon - http://www.cs.berkeley.edu/~daw/boon&lt;br /&gt;
* Pscan - http://www.striker.ottawa.on.ca/~aland/pscan&lt;br /&gt;
* FindBugs - http://findbugs.sourceforge.net/&lt;br /&gt;
&lt;br /&gt;
===Commercial ===&lt;br /&gt;
&lt;br /&gt;
* Fortify - http://www.fortifysoftware.com&lt;br /&gt;
* Ounce labs Prexis - http://www.ouncelabs.com&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
* GrammaTech - http://www.grammatech.com&lt;br /&gt;
* ParaSoft - http://www.parasoft.com&lt;br /&gt;
* ITS4 - http://www.cigital.com/its4&lt;br /&gt;
* CodeWizard - http://www.parasoft.com/products/wizard&lt;br /&gt;
* Armorize CodeSecure - http://www.armorize.com/product/&lt;br /&gt;
* Checkmarx CxSuite  - http://www.checkmarx.com/&lt;br /&gt;
&lt;br /&gt;
==Acceptance Testing Tools==&lt;br /&gt;
Acceptance testing tools are used validate the functionality of web applications.  Some follow a scripted approach and typically make use of a Unit Testing framework to construct test suites and test cases.  Most, if not all, can be adapted to perform security specific tests in addition to functional tests.&lt;br /&gt;
&lt;br /&gt;
===Open Source Tools===&lt;br /&gt;
&lt;br /&gt;
* WATIR - http://wtr.rubyforge.org/ - A Ruby based web testing framework that provides an interface into Internet Explorer.  Windows only.&lt;br /&gt;
* HtmlUnit - http://htmlunit.sourceforge.net/ - A Java and JUnit based framework that uses the Apache HttpClient as the transport.  Very robust and configurable and is used as the engine for a number of other testing tools.&lt;br /&gt;
* jWebUnit - http://jwebunit.sourceforge.net/ - A Java based meta-framework that uses htmlunit or selenium as the testing engine.&lt;br /&gt;
* Canoo Webtest - http://webtest.canoo.com/ - An XML based testing tool that provides a facade on top of htmlunit.  No coding is necessary as the tests are completely specified in XML.  There is the option of scripting some elements in Groovy if XML does not suffice.  Very actively maintained.&lt;br /&gt;
* HttpUnit - http://httpunit.sourceforge.net/ - One of the first web testing frameworks, suffers from using the native JDK provided HTTP transport, which can be a bit limiting for security testing.&lt;br /&gt;
* Watij - http://watij.com - A Java implementation of WATIR.  Windows only because it uses IE for it's tests (Mozilla integration is in the works).&lt;br /&gt;
* Solex - http://solex.sourceforge.net/ - An Eclipse plugin that provides a graphical tool to record HTTP sessions and make assertions based on the results.&lt;br /&gt;
* Selenium - http://www.openqa.org/selenium/ - JavaScript based testing framework, cross-platform and provides a GUI for creating tests.  Mature and popular tool, but the use of JavaScript could hamper certain security tests.&lt;br /&gt;
&lt;br /&gt;
==Other Tools==&lt;br /&gt;
&lt;br /&gt;
===Runtime Analysis===&lt;br /&gt;
&lt;br /&gt;
*  Rational PurifyPlus - http://www-306.ibm.com/software/awdtools&lt;br /&gt;
&lt;br /&gt;
===Binary Analysis===&lt;br /&gt;
&lt;br /&gt;
* BugScam - http://sourceforge.net/projects/bugscam&lt;br /&gt;
* BugScan - http://www.hbgary.com&lt;br /&gt;
* Veracode - http://www.veracode.com&lt;br /&gt;
&lt;br /&gt;
===Requirements Management===&lt;br /&gt;
&lt;br /&gt;
* Rational Requisite Pro - http://www-306.ibm.com/software/awdtools/reqpro&lt;br /&gt;
&lt;br /&gt;
'''Site Mirroring'''&lt;br /&gt;
* wget - http://www.gnu.org/software/wget, http://www.interlog.com/~tcharron/wgetwin.html&lt;br /&gt;
* curl - http://curl.haxx.se &lt;br /&gt;
* Sam Spade - http://www.samspade.org&lt;br /&gt;
* Xenu - http://home.snafu.de/tilman/xenulink.html&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_June_2007_meeting&amp;diff=19539</id>
		<title>Denver June 2007 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_June_2007_meeting&amp;diff=19539"/>
				<updated>2007-07-02T19:20:45Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The June meeting of the Denver OWASP chapter was be on June 21st at 7:00PM. [http://www.accuvant.com Accuvant] hosted the meeting at their downtown office. Refreshments were be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
The technical presentation was by David Byrne from EchoStar Satellite. He spoke on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that network firewalls can are completly bypassed to access internal servers. [[Image:anti-dns-pinning.ppt]]&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation was by David Stevens from Symplified. He discussed methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_June_2007_meeting&amp;diff=19536</id>
		<title>Denver June 2007 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_June_2007_meeting&amp;diff=19536"/>
				<updated>2007-07-02T18:55:49Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The June meeting of the Denver OWASP chapter was be on June 21st at 7:00PM. [http://www.accuvant.com Accuvant] hosted the meeting at their downtown office. Refreshments were be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
The technical presentation was by David Byrne from EchoStar Satellite. He spoke on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that network firewalls can are completly bypassed to access internal servers. [[Image:anti-dns-pinning.ppt Slides]]&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation was by David Stevens from Symplified. He discussed methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_June_2007_meeting&amp;diff=19535</id>
		<title>Denver June 2007 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_June_2007_meeting&amp;diff=19535"/>
				<updated>2007-07-02T18:55:33Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: New page: The June meeting of the Denver OWASP chapter was be on June 21st at 7:00PM. [http://www.accuvant.com Accuvant] hosted the meeting at their downtown office. Refreshments were be provided by...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The June meeting of the Denver OWASP chapter was be on June 21st at 7:00PM. [http://www.accuvant.com Accuvant] hosted the meeting at their downtown office. Refreshments were be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
The technical presentation was by David Byrne from EchoStar Satellite. He spoke on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that network firewalls can are completly bypassed to access internal servers. [[Image:anti-dns-pinning.ppt Slides]]&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation will be by David Stevens from Symplified. He will discuss methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=19534</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=19534"/>
				<updated>2007-07-02T18:53:40Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
Pending...&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver June 2007 meeting|June 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=19533</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=19533"/>
				<updated>2007-07-02T18:53:22Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Past Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting of the Denver OWASP chapter will be on June 21st at 7:00PM. [http://www.accuvant.com Accuvant] will be hosting the meeting at their downtown office. They are located at [http://maps.google.com/maps/ms?ie=UTF8&amp;amp;hl=en&amp;amp;om=1&amp;amp;msa=0&amp;amp;ll=39.745804,-104.989911&amp;amp;spn=0.003473,0.007296&amp;amp;z=17&amp;amp;msid=110637952161429929739.000001131c9ad0e7b2c31 621 17th St., Room 1120 (11th Floor), Denver, CO 80293]. The map has several parking locations indicated; if you need more detailed directions, please contact [mailto:david.byrne@echostar.com David Byrne]. Refreshments will be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
The technical presentation will be by David Byrne from EchoStar Satellite. He will speak on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that network firewalls can are completly bypassed to access internal servers. The presentation will focus on a live demonstration of an attack.&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation will be by David Stevens from Symplified. He will discuss methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver June 2007 meeting|June 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=19246</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=19246"/>
				<updated>2007-06-20T20:30:33Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting of the Denver OWASP chapter will be on June 21st at 7:00PM. [http://www.accuvant.com Accuvant] will be hosting the meeting at their downtown office. They are located at [http://maps.google.com/maps/ms?ie=UTF8&amp;amp;hl=en&amp;amp;om=1&amp;amp;msa=0&amp;amp;ll=39.745804,-104.989911&amp;amp;spn=0.003473,0.007296&amp;amp;z=17&amp;amp;msid=110637952161429929739.000001131c9ad0e7b2c31 621 17th St., Room 1120 (11th Floor), Denver, CO 80293]. The map has several parking locations indicated; if you need more detailed directions, please contact [mailto:david.byrne@echostar.com David Byrne]. Refreshments will be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
The technical presentation will be by David Byrne from EchoStar Satellite. He will speak on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that network firewalls can are completly bypassed to access internal servers. The presentation will focus on a live demonstration of an attack.&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation will be by David Stevens from Symplified. He will discuss methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=19137</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=19137"/>
				<updated>2007-06-11T21:18:28Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting of the Denver OWASP chapter will be on June 21st at 7:00PM. [http://www.accuvant.com Accuvant] will be hosting the meeting at their downtown office. They are located at [http://maps.google.com/maps/ms?ie=UTF8&amp;amp;hl=en&amp;amp;om=1&amp;amp;msa=0&amp;amp;ll=39.745804,-104.989911&amp;amp;spn=0.003473,0.007296&amp;amp;z=17&amp;amp;msid=110637952161429929739.000001131c9ad0e7b2c31 621 17th St. Denver, CO 80293]. The map has several parking locations indicated; if you need more detailed directions, please contact [mailto:david.byrne@echostar.com David Byrne]. Refreshments will be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
The technical presentation will be by David Byrne from EchoStar Satellite. He will speak on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that network firewalls can are completly bypassed to access internal servers. The presentation will focus on a live demonstration of an attack.&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation will be by David Stevens from Symplified. He will discuss methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=19136</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=19136"/>
				<updated>2007-06-11T21:17:50Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting of the Denver OWASP chapter will be on June 21st at 7:00PM. [http://www.accuvant.com Accuvant] will be hosting the meeting at their downtown office. They are located at [http://maps.google.com/maps/ms?ie=UTF8&amp;amp;hl=en&amp;amp;om=1&amp;amp;msa=0&amp;amp;ll=39.745804,-104.989911&amp;amp;spn=0.003473,0.007296&amp;amp;z=17&amp;amp;msid=110637952161429929739.000001131c9ad0e7b2c31 621 17th St. Denver, CO 80293]. The map has several parking locations indicated; if you need more detailed directions, please contact [mailto:david.byrne@echostar.com David Byrne]. Refreshments will be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
The technical presentation will be by David Byrne from EchoStar Satellite. He will speak on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that internal servers are not well protected by standard network firewalls. The presentation will focus on a live demonstration of an attack.&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation will be by David Stevens from Symplified. He will discuss methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=19135</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=19135"/>
				<updated>2007-06-11T21:16:30Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting of the Denver OWASP chapter will be on June 21st at 7:00PM. [http://www.accuvant.com Accuvant] will be hosting the meeting at their downtown office. They are located at [http://maps.google.com/maps/ms?ie=UTF8&amp;amp;hl=en&amp;amp;om=1&amp;amp;msa=0&amp;amp;ll=39.745804,-104.989911&amp;amp;spn=0.003473,0.007296&amp;amp;z=17&amp;amp;msid=110637952161429929739.000001131c9ad0e7b2c31 621 17th St. Denver, CO 80293]. The map has several parking locations indicated. If you need more detailed directions, please contact [mailto:david.byrne@echostar.com David Byrne]. Refreshments will be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The technical presentation will be by David Byrne from EchoStar Satellite. He will speak on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that internal servers are not well protected by standard network firewalls. The presentation will focus on a live demonstration of an attack.&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation will be by David Stevens from Symplified. He will discuss methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=19134</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=19134"/>
				<updated>2007-06-11T21:14:22Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting of the Denver OWASP chapter will be on June 21st at 7:00PM. The location will be announced shortly. Refreshments will be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
http://maps.google.com/maps/ms?ie=UTF8&amp;amp;hl=en&amp;amp;om=1&amp;amp;msa=0&amp;amp;ll=39.745804,-104.989911&amp;amp;spn=0.003473,0.007296&amp;amp;z=17&amp;amp;msid=110637952161429929739.000001131c9ad0e7b2c31&lt;br /&gt;
&lt;br /&gt;
The technical presentation will be by David Byrne from EchoStar Satellite. He will speak on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that internal servers are not well protected by standard network firewalls. The presentation will focus on a live demonstration of an attack.&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation will be by David Stevens from Symplified. He will discuss methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=19132</id>
		<title>OWASP Community</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=19132"/>
				<updated>2007-06-11T19:38:01Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is for people to post OWASP related events, such as chapter meetings, OWASP conferences, get-togethers, and OWASP sponsored events.&lt;br /&gt;
&lt;br /&gt;
Events from previous years are archived here:&lt;br /&gt;
* '''[[OWASP Community 2006]]'''&lt;br /&gt;
&lt;br /&gt;
This page is monitored, and items posted here will be copied to the OWASP [[Main Page]].  Please post new items in chronological order using the following format:&lt;br /&gt;
&lt;br /&gt;
 '''Mon ## (##:00h) - [[Article]]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
CHAPTER LEADS -- please put your schedule here and we'll post a month in advance&lt;br /&gt;
&lt;br /&gt;
*** Belgium ***&lt;br /&gt;
&lt;br /&gt;
*** OTTAWA: Rough dates ***&lt;br /&gt;
'''Sept 12 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
'''Nov 14 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
*** BOSTON: Every first Wednesday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** MELBOURNE: First Tuesday of the month ***&lt;br /&gt;
'''Jul 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
*** NETHERLANDS: Second Thursday of the month sometimes ***&lt;br /&gt;
'''Sept 13 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
'''Dec 13 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
*** ROCHESTER: Every third Monday of the month ***&lt;br /&gt;
&lt;br /&gt;
*** TORONTO: Every second Wednesday of the month&lt;br /&gt;
&lt;br /&gt;
*** VIRGINIA: Every second thursday of the month ***&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Events==&lt;br /&gt;
&lt;br /&gt;
'''June 26 (11:30hr) - [[Austin|Austin chapter meeting]]''' - Running Web Application Scans&lt;br /&gt;
&lt;br /&gt;
'''June 22 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 21 (19:00h) - [[Denver]]''' - Anti-DNS Pinning Attacks / Calculating Return on Security Investment (ROSI)&lt;br /&gt;
&lt;br /&gt;
'''June 15 (17:00hr) - [[Spain|Spain chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 13 (18:30hr) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''June 12 (18:00hr) - [[New York|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (19:00h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jun 5 (17:30h) - [[Houston | Houston Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (9:00h) - [[http://www.owasp.org/index.php/Italy#May_29th.2C_2007_-_Seminar:_.22Software_Security.22 Italy@Firenze Tecnologia]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 29 (11:30h) - [[Austin | Austin Chapter Meeting]]''' - Bullet Proof UI - A programmer's guide to the complete idiot&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''May 29 (18:00h) - [[Ottawa | Ottawa Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 22 (18:30h) - [[New Zealand|1st New Zealand chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 21 (14:00h) - [[Israel|2nd OWASP Israel mini conference]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 15 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 10 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 9 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 8 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 6 (11:00h) - [[Turkey|Turkey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 2 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''May 1 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (11:00h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 26 (17:00h) - [[Switzerland|Switzerland chapter meeting and &amp;quot;Swiss Security Dinner&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 24 (18:00h) - [[Minneapolis St Paul|Minneapolis St Paul chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 20 (19:00h) - [[Hong Kong|Hong Kong chapter meeting - Objectives for 2007]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 19 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 18 (17:00h) - [[San Francisco City Chapter Meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[New Jersey|NY/NJ Metro chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 17 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[San Jose|San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 11 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 4 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 30 - [[http://www.owasp.org/index.php/Italy#March_30th.2C_2007_-_Master_in_Security_-_University_of_Rome_.22La_Sapienza.22| Italy@Master in Security at &amp;quot;La Sapienza&amp;quot;]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 28 (11:30h) - [[San Antonio|San Antonio chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
; '''Mar 27-30 - [http://www.blackhat.com Black Hat Euro]'''&lt;br /&gt;
: OWASP members receive a Euro 100 Briefings discount by inserting BH7EUASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Mar 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 21-22 - [[Belgium#OWASP_Top_10_2007_Update_.28Infosecurity_Belgium.2C_21_.26_.2622_Mar_2007.29|Belgium@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 20 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 14 (18:00h) - [[Chicago|Chicago chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 13 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 8 (18:00h) - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[Philadelphia|Philadelphia chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[San Francisco|San Francisco and San Jose chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 5 (11:00h) - [[New Jersey|New Jersey chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 1 (11:30h) - [http://www.eusecwest.com/agenda.html EUSecWest 07: Testing Guide]'''&lt;br /&gt;
&lt;br /&gt;
; '''Feb 26-Mar 1 - [http://www.blackhat.com Black Hat DC]'''&lt;br /&gt;
: OWASP members receive a $100 Briefings discount by inserting BH7DCASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Feb 28 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 27 (18:00h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 21 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 19 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 13 (18:00h) - [[Ireland|Ireland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 12 (18:30h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6-7 - [[Italy#February_6th-8th.2C_2007_-_InfoSecurity|Italy@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 2 (14:00h) - [[Chennai|Chennai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 31 (15:00h) - [[Mumbai|Mumbai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 30 (11:30h) - [[Austin|Austin chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (18:00h) - [[San Francisco| San Francisco chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (14:30h) - [[Italy#October_25th.2C_2007_-_Isaca_Rome|Italy@ISACA Rome]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 24 (17:30h) - [[Israel#6th_OWASP_IL_meeting:_Wednesday.2C_January_24th_2007|6th OWASP Israel chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 23 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 22 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 17 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 16 (17:45h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:30h) - [[Phoenix|Phoenix chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 10 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 8 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 3 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=18955</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=18955"/>
				<updated>2007-06-05T18:44:45Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting of the Denver OWASP chapter will be on June 21st at 7:00PM. The location will be announced shortly. Refreshments will be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
The technical presentation will be by David Byrne from EchoStar Satellite. He will speak on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that internal servers are not well protected by standard network firewalls. The presentation will focus on a live demonstration of an attack.&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation will be by David Stevens from Symplified. He will discuss methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=18954</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=18954"/>
				<updated>2007-06-05T18:44:21Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Future Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting of the Denver OWASP chapter will be on June 21st at 7:00PM. The location will be announced shortly. Refreshments will be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The technical presentation will be by David Byrne from EchoStar Satellite. He will speak on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that internal servers are not well protected by standard network firewalls. The presentation will focus on a live demonstration of an attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation will be by David Stevens from Symplified. He will discuss methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=18953</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=18953"/>
				<updated>2007-06-05T18:43:49Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting of the Denver OWASP chapter will be on June 21st at 7:00PM. The location will be announced shortly. Refreshments will be provided by [http://www.symplified.com Symplified].&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The technical presentation will be by David Byrne from EchoStar Satellite. He will speak on Anti-DNS pinning attacks, a technique that allows an attacker to leverage cross-site-scripting to turn a web browser into a proxy server. This is done using standard browser functionality; no client-side vulnerabilities are required. The end-result is that internal servers are not well protected by standard network firewalls. The presentation will focus on a live demonstration of an attack.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The non/less technical presentation will be by David Stevens from Symplified. He will discuss methods to calculate Return on Security Investment (ROSI). Considering how difficult it often is to get funding for security initiatives, this is a useful skill for any security professional or security manager.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Authentication: single-sign-on, identity managment, LDAP injection attacks, etc&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
* Return on Security Investment (ROSI) calculations&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_April_2007_meeting&amp;diff=18952</id>
		<title>Denver April 2007 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_April_2007_meeting&amp;diff=18952"/>
				<updated>2007-06-05T18:41:20Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: New page: The April 2007 meeting was held on April 19 at 7:30PM in EchoStar's corporate headquarters.  Kartik Trivedi, Director of Application Assessment at Accuvant and also the Southern California...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The April 2007 meeting was held on April 19 at 7:30PM in EchoStar's corporate headquarters.&lt;br /&gt;
&lt;br /&gt;
Kartik Trivedi, Director of Application Assessment at Accuvant and also the Southern California OWASP leader presented on Web 2.0 (AJAX, etc).&lt;br /&gt;
&lt;br /&gt;
On the less technical side, Doug Staubach from EchoStar presented on the Payment Card Industry Data Security Standard (PCI DSS). PCI applies to all companies that handle credit card numbers. For large companies, the PCI standard specifically references OWASP’s as a preferred methodology to secure web-applications. &lt;br /&gt;
&lt;br /&gt;
Food &amp;amp; drink were provided by BT INS.&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=18951</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=18951"/>
				<updated>2007-06-05T18:40:27Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Past Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting will be on April 19 at 7:30PM in EchoStar's corporate headquarters.&lt;br /&gt;
&lt;br /&gt;
9601 S. Meridian Blvd&amp;lt;br&amp;gt;&lt;br /&gt;
Englewood, CO 80112&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;saddr=S+Havana+St+%26+E+Lincoln+Ave+80112&amp;amp;daddr=mAROON+cIR+%26+S+Meridian+Blvd+80112+to:9601+S+Meridian+Blvd,+Englewood,+Colorado+80112,+United+States&amp;amp;layer=&amp;amp;mrcr=0,1&amp;amp;sll=39.543136,-104.856563&amp;amp;sspn=0.014263,0.029182&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;ll=39.542275,-104.86021&amp;amp;spn=0.014264,0.029182&amp;amp;om=1 From I-25:]&lt;br /&gt;
* Turn east on Lincoln Ave. and drive almost ½ mile&lt;br /&gt;
* Turn left (north) on Havana St&lt;br /&gt;
* Take the first right (east) onto S. Meridian Blvd&lt;br /&gt;
* Follow Meridian for about 1 mile as it curves to the North&lt;br /&gt;
* Turn left (west) at the stoplight into EchoStar’s campus. There will be a large metallic sign.&lt;br /&gt;
&lt;br /&gt;
There will be two presentations. Kartik Trivedi, Director of Application Assessment at Accuvant and also the Southern California OWASP leader will be presenting on Web 2.0 (AJAX, etc).&lt;br /&gt;
&lt;br /&gt;
On the less technical side, Doug Staubach from EchoStar will be presenting on the Payment Card Industry Data Security Standard (PCI DSS). PCI applies to all companies that handle credit card numbers. For large companies, the PCI standard specifically references OWASP’s as a preferred methodology to secure web-applications. &lt;br /&gt;
&lt;br /&gt;
Food &amp;amp; drink are being provided by BT INS.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Authentication: single-sign-on, identity managment, LDAP injection attacks, etc&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
* Return on Security Investment (ROSI) calculations&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver April 2007 meeting|April 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=17932</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=17932"/>
				<updated>2007-04-19T17:10:51Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Future Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting will be on April 19 at 7:30PM in EchoStar's corporate headquarters.&lt;br /&gt;
&lt;br /&gt;
9601 S. Meridian Blvd&amp;lt;br&amp;gt;&lt;br /&gt;
Englewood, CO 80112&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;saddr=S+Havana+St+%26+E+Lincoln+Ave+80112&amp;amp;daddr=mAROON+cIR+%26+S+Meridian+Blvd+80112+to:9601+S+Meridian+Blvd,+Englewood,+Colorado+80112,+United+States&amp;amp;layer=&amp;amp;mrcr=0,1&amp;amp;sll=39.543136,-104.856563&amp;amp;sspn=0.014263,0.029182&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;ll=39.542275,-104.86021&amp;amp;spn=0.014264,0.029182&amp;amp;om=1 From I-25:]&lt;br /&gt;
* Turn east on Lincoln Ave. and drive almost ½ mile&lt;br /&gt;
* Turn left (north) on Havana St&lt;br /&gt;
* Take the first right (east) onto S. Meridian Blvd&lt;br /&gt;
* Follow Meridian for about 1 mile as it curves to the North&lt;br /&gt;
* Turn left (west) at the stoplight into EchoStar’s campus. There will be a large metallic sign.&lt;br /&gt;
&lt;br /&gt;
There will be two presentations. Kartik Trivedi, Director of Application Assessment at Accuvant and also the Southern California OWASP leader will be presenting on Web 2.0 (AJAX, etc).&lt;br /&gt;
&lt;br /&gt;
On the less technical side, Doug Staubach from EchoStar will be presenting on the Payment Card Industry Data Security Standard (PCI DSS). PCI applies to all companies that handle credit card numbers. For large companies, the PCI standard specifically references OWASP’s as a preferred methodology to secure web-applications. &lt;br /&gt;
&lt;br /&gt;
Food &amp;amp; drink are being provided by BT INS.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacks&lt;br /&gt;
* Authentication: single-sign-on, identity managment, LDAP injection attacks, etc&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
* Return on Security Investment (ROSI) calculations&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=17931</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=17931"/>
				<updated>2007-04-19T17:05:42Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting will be on April 19 at 7:30PM in EchoStar's corporate headquarters.&lt;br /&gt;
&lt;br /&gt;
9601 S. Meridian Blvd&amp;lt;br&amp;gt;&lt;br /&gt;
Englewood, CO 80112&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;saddr=S+Havana+St+%26+E+Lincoln+Ave+80112&amp;amp;daddr=mAROON+cIR+%26+S+Meridian+Blvd+80112+to:9601+S+Meridian+Blvd,+Englewood,+Colorado+80112,+United+States&amp;amp;layer=&amp;amp;mrcr=0,1&amp;amp;sll=39.543136,-104.856563&amp;amp;sspn=0.014263,0.029182&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;ll=39.542275,-104.86021&amp;amp;spn=0.014264,0.029182&amp;amp;om=1 From I-25:]&lt;br /&gt;
* Turn east on Lincoln Ave. and drive almost ½ mile&lt;br /&gt;
* Turn left (north) on Havana St&lt;br /&gt;
* Take the first right (east) onto S. Meridian Blvd&lt;br /&gt;
* Follow Meridian for about 1 mile as it curves to the North&lt;br /&gt;
* Turn left (west) at the stoplight into EchoStar’s campus. There will be a large metallic sign.&lt;br /&gt;
&lt;br /&gt;
There will be two presentations. Kartik Trivedi, Director of Application Assessment at Accuvant and also the Southern California OWASP leader will be presenting on Web 2.0 (AJAX, etc).&lt;br /&gt;
&lt;br /&gt;
On the less technical side, Doug Staubach from EchoStar will be presenting on the Payment Card Industry Data Security Standard (PCI DSS). PCI applies to all companies that handle credit card numbers. For large companies, the PCI standard specifically references OWASP’s as a preferred methodology to secure web-applications. &lt;br /&gt;
&lt;br /&gt;
Food &amp;amp; drink are being provided by BT INS.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** AJAX&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacksCommon mistakes and best practices for&lt;br /&gt;
* Authentication: single-sign-on, identity managment, LDAP injection attacks, etc&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
* Return on Security Investment (ROSI) calculations&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=17930</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=17930"/>
				<updated>2007-04-19T17:05:24Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting will be on April 19 at 7:30PM in EchoStar's corporate headquarters.&lt;br /&gt;
&lt;br /&gt;
9601 S. Meridian Blvd&lt;br /&gt;
Englewood, CO 80112&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;saddr=S+Havana+St+%26+E+Lincoln+Ave+80112&amp;amp;daddr=mAROON+cIR+%26+S+Meridian+Blvd+80112+to:9601+S+Meridian+Blvd,+Englewood,+Colorado+80112,+United+States&amp;amp;layer=&amp;amp;mrcr=0,1&amp;amp;sll=39.543136,-104.856563&amp;amp;sspn=0.014263,0.029182&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;ll=39.542275,-104.86021&amp;amp;spn=0.014264,0.029182&amp;amp;om=1 From I-25:]&lt;br /&gt;
* Turn east on Lincoln Ave. and drive almost ½ mile&lt;br /&gt;
* Turn left (north) on Havana St&lt;br /&gt;
* Take the first right (east) onto S. Meridian Blvd&lt;br /&gt;
* Follow Meridian for about 1 mile as it curves to the North&lt;br /&gt;
* Turn left (west) at the stoplight into EchoStar’s campus. There will be a large metallic sign.&lt;br /&gt;
&lt;br /&gt;
There will be two presentations. Kartik Trivedi, Director of Application Assessment at Accuvant and also the Southern California OWASP leader will be presenting on Web 2.0 (AJAX, etc).&lt;br /&gt;
&lt;br /&gt;
On the less technical side, Doug Staubach from EchoStar will be presenting on the Payment Card Industry Data Security Standard (PCI DSS). PCI applies to all companies that handle credit card numbers. For large companies, the PCI standard specifically references OWASP’s as a preferred methodology to secure web-applications. &lt;br /&gt;
&lt;br /&gt;
Food &amp;amp; drink are being provided by BT INS.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** AJAX&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacksCommon mistakes and best practices for&lt;br /&gt;
* Authentication: single-sign-on, identity managment, LDAP injection attacks, etc&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
* Return on Security Investment (ROSI) calculations&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=17860</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=17860"/>
				<updated>2007-04-13T19:04:25Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting will be on April 19 at 7:30PM in EchoStar's corporate headquarters.&lt;br /&gt;
&lt;br /&gt;
[http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;saddr=S+Havana+St+%26+E+Lincoln+Ave+80112&amp;amp;daddr=mAROON+cIR+%26+S+Meridian+Blvd+80112+to:9601+S+Meridian+Blvd,+Englewood,+Colorado+80112,+United+States&amp;amp;layer=&amp;amp;mrcr=0,1&amp;amp;sll=39.543136,-104.856563&amp;amp;sspn=0.014263,0.029182&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;ll=39.542275,-104.86021&amp;amp;spn=0.014264,0.029182&amp;amp;om=1 From I-25:]&lt;br /&gt;
* Turn east on Lincoln Ave. and drive almost ½ mile&lt;br /&gt;
* Turn left (north) on Havana St&lt;br /&gt;
* Take the first right (east) onto S. Meridian Blvd&lt;br /&gt;
* Follow Meridian for about 1 mile as it curves to the North&lt;br /&gt;
* Turn left (west) at the stoplight into EchoStar’s campus. There will be a large metallic sign.&lt;br /&gt;
&lt;br /&gt;
There will be two presentations. Kartik Trivedi, Director of Application Assessment at Accuvant and also the Southern California OWASP leader will be presenting on Web 2.0 (AJAX, etc).&lt;br /&gt;
&lt;br /&gt;
On the less technical side, Doug Staubach from EchoStar will be presenting on the Payment Card Industry Data Security Standard (PCI DSS). PCI applies to all companies that handle credit card numbers. For large companies, the PCI standard specifically references OWASP’s as a preferred methodology to secure web-applications. &lt;br /&gt;
&lt;br /&gt;
Food &amp;amp; drink are being provided by BT INS.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** AJAX&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacksCommon mistakes and best practices for&lt;br /&gt;
* Authentication: single-sign-on, identity managment, LDAP injection attacks, etc&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
* Return on Security Investment (ROSI) calculations&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=17859</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=17859"/>
				<updated>2007-04-13T19:04:07Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Next Meeting */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting will be on April 19 at 7:30PM in EchoStar's corporate headquarters.&lt;br /&gt;
[http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;saddr=S+Havana+St+%26+E+Lincoln+Ave+80112&amp;amp;daddr=mAROON+cIR+%26+S+Meridian+Blvd+80112+to:9601+S+Meridian+Blvd,+Englewood,+Colorado+80112,+United+States&amp;amp;layer=&amp;amp;mrcr=0,1&amp;amp;sll=39.543136,-104.856563&amp;amp;sspn=0.014263,0.029182&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;ll=39.542275,-104.86021&amp;amp;spn=0.014264,0.029182&amp;amp;om=1 From I-25:]&lt;br /&gt;
* Turn east on Lincoln Ave. and drive almost ½ mile&lt;br /&gt;
* Turn left (north) on Havana St&lt;br /&gt;
* Take the first right (east) onto S. Meridian Blvd&lt;br /&gt;
* Follow Meridian for about 1 mile as it curves to the North&lt;br /&gt;
* Turn left (west) at the stoplight into EchoStar’s campus. There will be a large metallic sign.&lt;br /&gt;
&lt;br /&gt;
There will be two presentations. Kartik Trivedi, Director of Application Assessment at Accuvant and also the Southern California OWASP leader will be presenting on Web 2.0 (AJAX, etc).&lt;br /&gt;
&lt;br /&gt;
On the less technical side, Doug Staubach from EchoStar will be presenting on the Payment Card Industry Data Security Standard (PCI DSS). PCI applies to all companies that handle credit card numbers. For large companies, the PCI standard specifically references OWASP’s as a preferred methodology to secure web-applications. &lt;br /&gt;
&lt;br /&gt;
Food &amp;amp; drink are being provided by BT INS.&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** AJAX&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacksCommon mistakes and best practices for&lt;br /&gt;
* Authentication: single-sign-on, identity managment, LDAP injection attacks, etc&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
* Return on Security Investment (ROSI) calculations&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_February_2007_meeting&amp;diff=17396</id>
		<title>Denver February 2007 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_February_2007_meeting&amp;diff=17396"/>
				<updated>2007-03-22T15:59:14Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== February 2007 Meeting ==&lt;br /&gt;
&lt;br /&gt;
A meeting was held on February 21, 6:30PM at EchoStar Satellite's headquarters south of the DTC. There were about 30 people in attendance. John Hoops from [http://www.verisign.com/ Verisign] gave a great presntation on Advanced SQL Injection.&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_February_2007_meeting&amp;diff=17395</id>
		<title>Denver February 2007 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_February_2007_meeting&amp;diff=17395"/>
				<updated>2007-03-22T15:58:57Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: New page:  == February 2007 Meeting ==  A meeting was held on February 21, 6:30PM at EchoStar Satellite's headquarters south of the DTC.   John Hoops from [http://www.verisign.com/ Verisign] gave a ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
== February 2007 Meeting ==&lt;br /&gt;
&lt;br /&gt;
A meeting was held on February 21, 6:30PM at EchoStar Satellite's headquarters south of the DTC. &lt;br /&gt;
&lt;br /&gt;
John Hoops from [http://www.verisign.com/ Verisign] gave a great presntation on Advanced SQL Injection.&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=17394</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=17394"/>
				<updated>2007-03-22T15:49:11Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting will be on April 19. A survey is being sent out to the distribution list regarding location &amp;amp; time. There will be two presentations. Kartik Trivedi, Director of Application Assessment at Accuvant and also the Southern California OWASP leader will be presenting on _____ &lt;br /&gt;
&lt;br /&gt;
On the less technical side, Doug Staubach from EchoStar will be presenting on the Payment Card Industry Data Security Standard (PCI DSS). PCI applies to all companies that handle credit card numbers. For large companies, the PCI standard specifically references OWASP’s as a preferred methodology to secure web-applications. &lt;br /&gt;
&lt;br /&gt;
Food &amp;amp; drink are still being sorted out, but will be there.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** AJAX&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacksCommon mistakes and best practices for&lt;br /&gt;
* Authentication: single-sign-on, identity managment, LDAP injection attacks, etc&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
* Return on Security Investment (ROSI) calculations&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver February 2007 meeting|February 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16554</id>
		<title>User talk:Davidribyrne@yahoo.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16554"/>
				<updated>2007-02-20T01:55:44Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: Removing all content from page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16553</id>
		<title>User talk:Davidribyrne@yahoo.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16553"/>
				<updated>2007-02-20T01:54:52Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;iframe src=http://ha.ckers.org/scriptlet.html &amp;lt;&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16552</id>
		<title>User talk:Davidribyrne@yahoo.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16552"/>
				<updated>2007-02-20T01:47:17Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16551</id>
		<title>User talk:Davidribyrne@yahoo.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16551"/>
				<updated>2007-02-20T01:46:13Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: Removing all content from page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16539</id>
		<title>User talk:Davidribyrne@yahoo.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16539"/>
				<updated>2007-02-19T18:34:49Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt; A �A script&lt;br /&gt;
asd&amp;lt;f&amp;gt;alert(&amp;quot;hi&amp;quot;);&amp;lt;/script&amp;gt;&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16538</id>
		<title>User talk:Davidribyrne@yahoo.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16538"/>
				<updated>2007-02-19T18:33:26Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;%00script&lt;br /&gt;
asd&amp;lt;f&amp;gt;alert(&amp;quot;hi&amp;quot;);&amp;lt;/script&amp;gt;&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16537</id>
		<title>User talk:Davidribyrne@yahoo.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16537"/>
				<updated>2007-02-19T18:27:59Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt; script&lt;br /&gt;
asd&amp;lt;f&amp;gt;alert(&amp;quot;hi&amp;quot;);&amp;lt;/script&amp;gt;&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16536</id>
		<title>User talk:Davidribyrne@yahoo.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16536"/>
				<updated>2007-02-19T18:24:46Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;script&lt;br /&gt;
&amp;lt;a&amp;gt;alert(&amp;quot;hi&amp;quot;);&amp;lt;/script&amp;gt;&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16524</id>
		<title>User talk:Davidribyrne@yahoo.com</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Davidribyrne@yahoo.com&amp;diff=16524"/>
				<updated>2007-02-18T18:18:09Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: New page: &amp;lt;script�&amp;gt;alert(&amp;quot;hi&amp;quot;);&amp;lt;/script�&amp;gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;script�&amp;gt;alert(&amp;quot;hi&amp;quot;);&amp;lt;/script�&amp;gt;&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=16522</id>
		<title>OWASP Community</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Community&amp;diff=16522"/>
				<updated>2007-02-18T18:09:57Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page is for people to post OWASP related events, such as chapter meetings, OWASP conferences, get-togethers, and OWASP sponsored events.&lt;br /&gt;
&lt;br /&gt;
Events from previous years are archived here:&lt;br /&gt;
* '''[[OWASP Community 2006]]'''&lt;br /&gt;
&lt;br /&gt;
This page is monitored, and items posted here will be copied to the OWASP [[Main Page]].  Please post new items in chronological order using the following format:&lt;br /&gt;
&lt;br /&gt;
 '''Mon ## (##:00h) - [[Article]]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;!--&lt;br /&gt;
&lt;br /&gt;
CHAPTER LEADS -- please put your schedule here and we'll post a month in advance&lt;br /&gt;
&lt;br /&gt;
*** OTTAWA: Rough dates ***&lt;br /&gt;
'''Mar 7 - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
'''May 9 - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
'''Sept 12 - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
'''Nov 14 - [[Ottawa|Ottawa Chapter Meeting]] '''&lt;br /&gt;
&lt;br /&gt;
*** BOSTON: Every first Wednesday of the month ***&lt;br /&gt;
'''Mar 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
'''Apr 4 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
'''May 2 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
*** MELBOURNE: First Tuesday of the month ***&lt;br /&gt;
'''Mar 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
'''Apr 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
'''May 1 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
'''Jun 5 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
'''Jul 3 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
*** NETHERLANDS: Second Thursday of the month sometimes ***&lt;br /&gt;
'''Sept 13 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
'''Dec 13 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
*** ROCHESTER: Every third Monday of the month ***&lt;br /&gt;
'''Mar 20 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
'''Apr 17 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
'''May 15 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
*** TORONTO: Every second Wednesday of the month&lt;br /&gt;
'''Mar 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
'''Apr 11 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
'''May 9 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
*** VIRGINIA: Every second tuesday of the month ***&lt;br /&gt;
'''Mar 13 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
'''Apr 10 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
'''May 8 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
--&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Events==&lt;br /&gt;
&lt;br /&gt;
'''May 10 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Apr 12 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
; '''Mar 27-30 - [http://www.blackhat.com Black Hat Euro]'''&lt;br /&gt;
: OWASP members receive a Euro 100 Briefings discount by inserting BH7EUASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Mar 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 7 (18:30h) - [[Kansas City|Kansas City chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:30h) - [[Philadelphia|Philadelphia chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Mar 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
; '''Feb 26-Mar 1 - [http://www.blackhat.com Black Hat DC]'''&lt;br /&gt;
: OWASP members receive a $100 Briefings discount by inserting BH7DCASSOC in the box marked “Coupon Codes”&lt;br /&gt;
&lt;br /&gt;
'''Feb 28 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 27 (18:00h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:30h) - [[Helsinki|Helsinki chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 22 (18:00h) - [[London|London chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 21 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 19 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Washington DC|Washington DC (MD) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 15 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 14 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 13 (18:00h) - [[Ireland|Ireland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 12 (18:30h) - [[Switzerland|Switzerland chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 7 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6-7 - [[Italy#February_6th-8th.2C_2007_-_InfoSecurity|Italy@InfoSecurity]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 6 (18:00h) - [[Melbourne|Melbourne chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Feb 2 (14:00h) - [[Chennai|Chennai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 31 (15:00h) - [[Mumbai|Mumbai chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 30 (11:30h) - [[Austin|Austin chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (18:00h) - [[San Francisco| San Francisco chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 25 (14:30h) - [[Italy#October_25th.2C_2007_-_Isaca_Rome|Italy@ISACA Rome]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 24 (17:30h) - [[Israel#6th_OWASP_IL_meeting:_Wednesday.2C_January_24th_2007|6th OWASP Israel chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 23 (18:00h) - [[Belgium|Belgium chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 22 (18:00h) - [[Rochester|Rochester chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 17 (18:30h) - [[Denver|Denver chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 16 (17:45h) - [[Edmonton|Edmonton chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Netherlands|Netherlands chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:30h) - [[Phoenix|Phoenix chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 11 (18:00h) - [[Virginia (Northern Virginia)|Washington DC (N. VA) chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 10 (18:00h) - [[Toronto|Toronto chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 8 (18:00h) - [[Seattle|Seattle chapter meeting]]'''&lt;br /&gt;
&lt;br /&gt;
'''Jan 3 (18:30h) - [[Boston|Boston chapter meeting]]'''&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver_January_2007_meeting&amp;diff=16518</id>
		<title>Denver January 2007 meeting</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver_January_2007_meeting&amp;diff=16518"/>
				<updated>2007-02-18T18:04:15Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: New page: == January 2007 Meeting ==  The next meeting will be on January 17, 6:30PM at EchoStar Satellite's headquarters south of the DTC. The classroom we are meeting in can easily hold 50 people;...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== January 2007 Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting will be on January 17, 6:30PM at EchoStar Satellite's headquarters south of the DTC. The classroom we are meeting in can easily hold 50 people; far more if we crowd in. This should make for more breathing room than last month. If you think you may attend, please RSVP to [david.byrne@echostar.com] with your name and company. Directions can be found [http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;saddr=I-25+(N)+%26+E+Lincoln+Ave,+Parker,+CO+80134&amp;amp;daddr=9601+S.+Meridian+Blvd+Englewood,+co+80112&amp;amp;ie=UTF8&amp;amp;sll=39.54211,-104.86157&amp;amp;sspn=0.022107,0.058365&amp;amp;z=14&amp;amp;om=1 here]. Come to the main entrance and tell the security guard you are with the OWASP meeting. If you get lost, call David Byrne at (desk) 720-514-5675 or (cell) 303-912-2612.&lt;br /&gt;
&lt;br /&gt;
Michael Walter will be giving a presentation on security in the SDLC and David Ferguson with [http://www.fishnetsecurity.com/ FishNet Security] (and the leader of the Kansas City OWASP chapter) will be presenting on session managment and web services.&lt;br /&gt;
&lt;br /&gt;
The [http://www.southseascorp.com/ South Seas Corporation] will be providing food &amp;amp; drink.&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=16517</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=16517"/>
				<updated>2007-02-18T18:03:59Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: /* Past Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** AJAX&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacksCommon mistakes and best practices for&lt;br /&gt;
* Authentication: single-sign-on, identity managment, LDAP injection attacks, etc&lt;br /&gt;
* Payment Card Industry (PCI) compliance, relating to web apps&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
* Return on Security Investment (ROSI) calculations&lt;br /&gt;
&lt;br /&gt;
== February 2007 Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting will be on February 21, 6:30PM at EchoStar Satellite's headquarters south of the DTC. If you think you may attend, please RSVP to [david.byrne@echostar.com] with your name and company. Directions can be found [http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;saddr=I-25+(N)+%26+E+Lincoln+Ave,+Parker,+CO+80134&amp;amp;daddr=9601+S.+Meridian+Blvd+Englewood,+co+80112&amp;amp;ie=UTF8&amp;amp;sll=39.54211,-104.86157&amp;amp;sspn=0.022107,0.058365&amp;amp;z=14&amp;amp;om=1 here]. Come to the main entrance and tell the security guard you are with the OWASP meeting. If you get lost, call David Byrne at (desk) 720-514-5675 or (cell) 303-912-2612.&lt;br /&gt;
&lt;br /&gt;
Buck Watia from [http://www.verisign.com/ Verisign] will be presenting on Advanced SQL Injection. &lt;br /&gt;
&lt;br /&gt;
[http://www.fishnetsecurity.com/ FishNet Security] will be providing food &amp;amp; drink.&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;br /&gt;
&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Denver&amp;diff=16516</id>
		<title>Denver</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Denver&amp;diff=16516"/>
				<updated>2007-02-18T18:03:39Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Denver|extra=The chapter leaders are [mailto:davidribyrne@yahoo.com David Byrne] and [mailto:owasp@justplainpix.com Andy Lewis]. |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-denver|emailarchives=http://lists.owasp.org/pipermail/owasp-denver}}&lt;br /&gt;
&lt;br /&gt;
== Future Meetings == &lt;br /&gt;
Below is a list of potential topics for future meetings. If you are interested in presenting, or at least contributing to the content of a presentation on any topic, please send [mailto:davidribyrne@yahoo.com David Byrne] an e-mail. Feel free to submit ideas for other topics as well.&lt;br /&gt;
&lt;br /&gt;
* Common security mistakes and best practices for&lt;br /&gt;
** AJAX&lt;br /&gt;
** .Net&lt;br /&gt;
** J2EE&lt;br /&gt;
* Performing security-oriented code reviews&lt;br /&gt;
* HTTP message spliting attacksCommon mistakes and best practices for&lt;br /&gt;
* Authentication: single-sign-on, identity managment, LDAP injection attacks, etc&lt;br /&gt;
* Payment Card Industry (PCI) compliance, relating to web apps&lt;br /&gt;
* Sarbanes Oxley (SOX) compliance, relating to web apps&lt;br /&gt;
* Return on Security Investment (ROSI) calculations&lt;br /&gt;
&lt;br /&gt;
== February 2007 Meeting ==&lt;br /&gt;
&lt;br /&gt;
The next meeting will be on February 21, 6:30PM at EchoStar Satellite's headquarters south of the DTC. If you think you may attend, please RSVP to [david.byrne@echostar.com] with your name and company. Directions can be found [http://maps.google.com/maps?f=d&amp;amp;hl=en&amp;amp;saddr=I-25+(N)+%26+E+Lincoln+Ave,+Parker,+CO+80134&amp;amp;daddr=9601+S.+Meridian+Blvd+Englewood,+co+80112&amp;amp;ie=UTF8&amp;amp;sll=39.54211,-104.86157&amp;amp;sspn=0.022107,0.058365&amp;amp;z=14&amp;amp;om=1 here]. Come to the main entrance and tell the security guard you are with the OWASP meeting. If you get lost, call David Byrne at (desk) 720-514-5675 or (cell) 303-912-2612.&lt;br /&gt;
&lt;br /&gt;
Buck Watia from [http://www.verisign.com/ Verisign] will be presenting on Advanced SQL Injection. &lt;br /&gt;
&lt;br /&gt;
[http://www.fishnetsecurity.com/ FishNet Security] will be providing food &amp;amp; drink.&lt;br /&gt;
&lt;br /&gt;
== Past Meetings ==&lt;br /&gt;
&lt;br /&gt;
[[Denver November 2006 meeting|November 2006]]&lt;br /&gt;
[[Denver January 2007 meeting|January 2007]]&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=SQL_Injection_Cookbook_-_MSSQL&amp;diff=15463</id>
		<title>SQL Injection Cookbook - MSSQL</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=SQL_Injection_Cookbook_-_MSSQL&amp;diff=15463"/>
				<updated>2007-01-17T01:08:58Z</updated>
		
		<summary type="html">&lt;p&gt;Davidribyrne@yahoo.com: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__TOC__&lt;br /&gt;
=Database objects=&lt;br /&gt;
==Tables==&lt;br /&gt;
===List table names===&lt;br /&gt;
===List columns for a specific table===&lt;br /&gt;
===View table permissions===&lt;br /&gt;
===Change table permissions===&lt;br /&gt;
===Create a table===&lt;br /&gt;
&lt;br /&gt;
==Stored procedures or functions==&lt;br /&gt;
===List stored procedures or functions===&lt;br /&gt;
===Parameters for a stored procedure or function===&lt;br /&gt;
===Source code of a stored procedure or function===&lt;br /&gt;
===Create a stored procedure or function===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=System data=&lt;br /&gt;
==Users==&lt;br /&gt;
===Identify current user===&lt;br /&gt;
===List of database users===&lt;br /&gt;
===List of database administrators===&lt;br /&gt;
===Database user permissions===&lt;br /&gt;
===Create a new user===&lt;br /&gt;
===Change a user password===&lt;br /&gt;
===Delete a user===&lt;br /&gt;
&lt;br /&gt;
==Database server==&lt;br /&gt;
===View database server settings===&lt;br /&gt;
===Change database server settings===&lt;br /&gt;
===View database server processes===&lt;br /&gt;
===Kill database server process===&lt;br /&gt;
&lt;br /&gt;
==Host Operating System==&lt;br /&gt;
===Operating System version===&lt;br /&gt;
===OS environment variables===&lt;br /&gt;
===Execute OS shell command===&lt;br /&gt;
===Read file contents===&lt;br /&gt;
===Arbitrary file writes===&lt;br /&gt;
===File uploads===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Queries=&lt;br /&gt;
==Strings==&lt;br /&gt;
===Valid string delimiters===&lt;br /&gt;
===String concatenation===&lt;br /&gt;
===String-based queries with no quote characters===&lt;br /&gt;
&lt;br /&gt;
==Query syntax==&lt;br /&gt;
===Result row count limiters===&lt;br /&gt;
===Acceptable whitespace===&lt;br /&gt;
===Tableless queries===&lt;br /&gt;
===Query comments===&lt;br /&gt;
===Command delimiters===&lt;br /&gt;
===Set operators===&lt;br /&gt;
Set operators are used to combine the results from two different queries. The number of columns and order of column types must be identical for both queries. The general syntax is&lt;br /&gt;
&lt;br /&gt;
  SELECT&lt;br /&gt;
     fname, lname&lt;br /&gt;
  FROM&lt;br /&gt;
     employees&lt;br /&gt;
  '''''SET_OPERATOR'''''&lt;br /&gt;
  SELECT&lt;br /&gt;
     fname, lname&lt;br /&gt;
  FROM&lt;br /&gt;
     customers&lt;br /&gt;
&lt;br /&gt;
==Special queries==&lt;br /&gt;
===Single column queries===&lt;br /&gt;
===Single row queries===&lt;br /&gt;
&lt;br /&gt;
==Functions, etc.==&lt;br /&gt;
===Data type casting===&lt;br /&gt;
===Query output to file===&lt;br /&gt;
&lt;br /&gt;
=Attacks=&lt;br /&gt;
==Breaking out of a query==&lt;br /&gt;
===WHERE clauses===&lt;br /&gt;
===FROM clauses===&lt;br /&gt;
===Other parts of a SELECT===&lt;br /&gt;
===INSERT statements===&lt;br /&gt;
===UPDATE statements===&lt;br /&gt;
&lt;br /&gt;
==Inference and timing attacks==&lt;br /&gt;
==SQL Tautologies==&lt;br /&gt;
A tautology is something that is inherently true. SQL tautologies are used when you want to force a query to return all results, basically ignoring any WHERE conditionals. Simple tautologies like &amp;quot; OR 1=1&amp;quot; are useful, but may be filtered out by some security tools. The table below offers a number of tautologies that filter writers (even on well known commercial tools) may not have considered.&lt;br /&gt;
{| style=&amp;quot;width:75%;&amp;quot; border=&amp;quot;1&amp;quot; cellspacing=&amp;quot;0&amp;quot; cellpadding=&amp;quot;5&amp;quot;&lt;br /&gt;
! width=&amp;quot;55%&amp;quot;|Statement&lt;br /&gt;
! width=&amp;quot;15%&amp;quot;|Numeric&lt;br /&gt;
(1 = 1)&lt;br /&gt;
! width=&amp;quot;15%&amp;quot;|String&lt;br /&gt;
('a' = 'a')&lt;br /&gt;
! width=&amp;quot;15%&amp;quot;|Binary&lt;br /&gt;
(0x1 = 0x1)&lt;br /&gt;
|-&lt;br /&gt;
| '''''a''''' = '''''a'''''&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | X&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | X&lt;br /&gt;
| align=&amp;quot;center&amp;quot; | X&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
=Data exfiltration=&lt;br /&gt;
==E-mail==&lt;br /&gt;
==Web==&lt;br /&gt;
==General network==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=Platform specific=&lt;br /&gt;
==Unique database platform features==&lt;br /&gt;
==Authoritative documentation resources==&lt;br /&gt;
==Links==&lt;/div&gt;</summary>
		<author><name>Davidribyrne@yahoo.com</name></author>	</entry>

	</feed>