<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Fuentes.joaquin</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Fuentes.joaquin"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Fuentes.joaquin"/>
		<updated>2026-05-03T10:54:23Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252912</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252912"/>
				<updated>2019-07-08T22:05:18Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2019 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2018 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2-day conference is in Mesa, AZ December 6 &amp;amp; 7. Registration and volunteer information can be found here:'&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;https://www.cactuscon.com&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2019 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2019 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''July 24, 2019 (6:15PM-7:45PM) - A Practical Approach to Secure Code Reviews'''&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.meetup.com/OWASP-Phoenix/events/262982992/&lt;br /&gt;
&lt;br /&gt;
''Presenter:'' Seth Law&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Let’s face it, performing a manual review of someone else’s source code is hard. It takes time, effort, expertise, and grit to actually figure out what the application does, how the developer implemented it, and if there should be any changes. From an application security perspective, this becomes even more difficult because of the security nuances of multiple languages that must be understood in order to identify and squash vulnerabilities. On top of that, most security reviews must be performed within a limited amount of time against more lines of code than recommended in standard code review best practices.&lt;br /&gt;
&lt;br /&gt;
After performing secure code reviews for over a decade, it becomes easier to identify a pattern and framework to address security concerns within code quickly and efficiently. This talk will introduce the Absolute AppSec Secure Code Review Framework to attendees and discuss lessons learned, code review tips and tricks, and strategies for quickly assessing code that can be used by reviewers immediately.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Seth Law''' is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. Seth is employed as a security consultant, hosts the Absolute AppSec podcast with Ken Johnson, and is a regular speaker at developer meetups and security events, including Blackhat, Defcon, CactusCon, and other regional conferences.&lt;br /&gt;
&lt;br /&gt;
'''June 19, 2019 (6:30PM-7:45PM) - The Danger of Exposing docker.sock'''&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.meetup.com/OWASP-Phoenix/events/262095694/&lt;br /&gt;
&lt;br /&gt;
''Presenter:'' Dejan Zelic&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Common containers such as traefik, nginx-proxy (jwilder), Netdata, vamp, and many more recommend exposing the Docker socket within the container. This configuration could allow for privilege and horizontal escalation in a Docker environment. Other services, like Portainer, could leave the entire host and other containers exposed on the Internet. In a recent blog post, Dejan explained the dangers of exposing the Docker Socket. During this talk he will explain the vulnerability and demo exploiting a Docker environment.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Content Devloper at Offensive Security, and was previously the Penetration Testing Team Lead at Early Warning. He enjoys teaching and mentoring others in security. His current interests involve tinkering with IoT, home automation, and competing in CTFs.  Outside of technology, he enjoys playing soccer, woodworking, and gardening. He recently adopted a 3 year old Greyhound named Bellini.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2018 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''November 07, 2018 (6:30PM-7:30PM) - Women in Security'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Marija Strazdas&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': In this session, Marija will talk on the tech world from a woman’s point of view, discussing how she got to where she is today, how Mentoring and Passion are what really propel you forward, (along with helping you pay it forward!), and of course, she’ll talk about Security.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Marija Strazdas''' Marija has over 15 years of experience in technology, spanning from data center &amp;amp; cloud infrastructure, to software development, to security and compliance, including DR architecture. Marija has worked as a Principal Architect in Managed Hosting at NaviSite, and as both a Tier 1 and Tier 3 Systems Engineer at Lucent, along with SE roles at Telcordia/Bell Labs and Mobilcom. This experience has allowed her to develop a deep understanding of business’ requirements of both security and availability, meshing perfectly with AlertLogic’s solutions and mission.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October 25, 2018 (6:00 - 10:00) - CMD +  CTRL Web App Capture The Flag Hackathon, Training, Mentoring'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Security Innovations, Joaquin Fuentes &amp;amp; the Early Warning Penetration Testing Team &amp;quot;Savage Submarine&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Unique in the industry, CMD+CTRL is an immersive and fun learning environment where you will exploit your way through hundreds of vulnerabilities that lurk in business applications today – and learn quickly that attack and defense are about thinking on your feet. Unlike gamification that mimics how an application should respond, CMD+CTRL comprises real websites, traffic, technologies, and vulnerabilities that represent actual application behavior. This unmatched realism brings the immediate gratification and long-term memory benefits of “learning by doing&amp;quot; that teams need in order to protect the enterprise.&lt;br /&gt;
&lt;br /&gt;
Security Innovation Will Provide&lt;br /&gt;
&lt;br /&gt;
Experts to lead attendees through this training session and hackathon which will introduce participants to core security concepts and provide insight into how hackers break into a web site leveraging common vulnerabilities, insecure practices and more!&lt;br /&gt;
&lt;br /&gt;
This workshop is ideal for all skill levels – beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CMD+CTRL platform: a fully-featured Shadow Bank financial application to practice situational awareness like an attacker.&lt;br /&gt;
&lt;br /&gt;
Participants Will Need&lt;br /&gt;
&lt;br /&gt;
A laptop to connect to our CMD+CTRL website…and your evil streak!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''June 20, 2018 (6:15PM-7:45PM) - Practical IOT Exploitation - How to get started hacking IOT'''&lt;br /&gt;
&lt;br /&gt;
''Presenter:'' Aditya Gupta&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': In this session, attendees will gain an in-depth understanding of the security vulnerabilities in the Internet of Things devices around us, how they can find vulnerabilities and exploit them. If you have never done IoT Exploitation or penetration testing of IoT devices earlier, this talk will help you get started.&lt;br /&gt;
&lt;br /&gt;
We will be mostly focusing on Smart Home devices, but the techniques would apply to pretty much any IoT device that you will encounter.&lt;br /&gt;
&lt;br /&gt;
Some of the topics that we will look at are:&lt;br /&gt;
&lt;br /&gt;
1. Exploiting Communication protocols&lt;br /&gt;
2. Hardware hacking for IoT devices&lt;br /&gt;
3. Firmware RE techniques and Exploitation&lt;br /&gt;
&lt;br /&gt;
The talk contains both live demonstrations exploiting IoT components and would also share insights on the methodology to be used in order to perform pentesting of IoT devices.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Aditya Gupta''' is the founder of Attify, a specialized security firm offering training and penetration testing services for Internet of Things devices. He is also the author of IoT Hackers Handbook and IoT Pentesting Cookbook and has delivered talks and training at conferences such as BlackHat, DefCon, OWASP AppSec, Toorcon and others. His most recent project is the IoT Exploitation Learning Kit – a self-learning training solution to help security enthusiasts learn about IoT pentesting and gain hands-on experience of the tools and tactics.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 05, 2018 (6:30PM-7:45PM) - Lightning Talks on Cool OWASP Projects'''&lt;br /&gt;
&lt;br /&gt;
''Presenters: Joaquin Fuentes, Dejan Zelic, Alex Boyle, Michael McCambridge''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Four speakers will provide brief talks and demonstrations on &amp;quot;cool&amp;quot; OWASP application security projects that you may not have taken the time to explore on your own. Join us to do some people networking and to get the cliff notes on projects we think are worth sharing. This is your opportunity to learn about application security through other security professional's experiences.&lt;br /&gt;
&lt;br /&gt;
Each talk will last about 10 minutes. There will be time for Q&amp;amp;A as well. We'll have a post-meeting happy hour at the Vig McDowell Mtn. Ranch for those that are interested in continuing the discussions.&lt;br /&gt;
&lt;br /&gt;
'''Speakers &amp;amp; Topics''':&lt;br /&gt;
&lt;br /&gt;
Joaquin Fuentes - Juice Shop&lt;br /&gt;
&lt;br /&gt;
Dejan Zelic - ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
Alex Boyle - ZAP (Zed Attack Proxy)&lt;br /&gt;
&lt;br /&gt;
Mike McCambridge - Application Security Verification Standard&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Joaquin Fuentes''' manages Penetration Testing, Cyber Threat Intelligence and Incident Response at Early Warning. He has practical experience performing full scope penetration tests including web, app, network, physical and social engineering as a consultant at IBM &amp;amp; SunGard. In his free time, he enjoys traveling, photography and flying drones.&lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Penetration Testing team lead at Early Warning.&lt;br /&gt;
&lt;br /&gt;
'''Alex Boyle''' works as a Security Penetration Tester for Early Warning Services in Scottsdale, AZ. The majority of his security assessments focus on web based technologies, open source intelligence gathering (OSINT), and social engineering. He is a senior at ASU completing his online Information Technology bachelors.&lt;br /&gt;
&lt;br /&gt;
'''Michael McCambridge''' is a penetration tester in his 5th year at Early Warning. He entered the security field after graduate studies in Computer Science at the University of Arizona. A mechanical engineer in a former life, Mike finds pentesting to be a whole lot more fun!&lt;br /&gt;
&lt;br /&gt;
'''March 06, 2018 (6:30PM-7:45PM) - 10 Mistakes Security Engineers Make'''&lt;br /&gt;
&lt;br /&gt;
''Presenter: Damilare D. Fagbemi, Security Architect at Intel Corporation''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Let’s face it, product security isn’t going anywhere anytime soon. Product security increasingly occurs by the minute as software houses build infrastructure to allow the provision of hourly software updates. Software isn’t just everywhere, the manner in which it’s designed is also a moving target. Considering all that churn, it’s unsurprising that information security related roles are one of the hottest items on the job market.But those jobs stay hot, because we just don’t have enough people with the necessary skills. This results in a dependence on relatively few security experts in most organizations – and those experts often need to scale to a large number of product teams.&lt;br /&gt;
&lt;br /&gt;
How can security engineers succeed and scale effectively? To answer that question, we peeled back the different layers of the product security engineering role. We explored how the security engineer approaches projects, interacts with teams, trains developers, communicates with management, assesses business risk and tackles other problems. Post analysis, we arrived at a set tips which we’re calling the Don’ts (and Dos) of the trade.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Damilare D. Fagbemi'''  is a Security Architect at Intel Corporation, where he has the pleasure of working with talented software teams to drive and improve product security in mobile, web, and IoT solutions. He is also a Chapter leader at the Open Web Application Security Project (OWASP) in Nigeria, and a former Co-founder of verdeinfotech.com, a web development consultancy. He enjoys writing and blogs at edgeofus.com. When he’s not stuck in a computer, he can be found exploring nature and trying to stay active without a fitness tracker.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252362</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252362"/>
				<updated>2019-06-11T17:27:52Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2018 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2-day conference is in Mesa, AZ December 6 &amp;amp; 7. Registration and volunteer information can be found here:'&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;https://www.cactuscon.com&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2019 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2019 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''June 19, 2019 (6:30PM-7:45PM) - The Danger of Exposing docker.sock'''&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.meetup.com/OWASP-Phoenix/events/262095694/&lt;br /&gt;
&lt;br /&gt;
''Presenter:'' Dejan Zelic&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Common containers such as traefik, nginx-proxy (jwilder), Netdata, vamp, and many more recommend exposing the Docker socket within the container. This configuration could allow for privilege and horizontal escalation in a Docker environment. Other services, like Portainer, could leave the entire host and other containers exposed on the Internet. In a recent blog post, Dejan explained the dangers of exposing the Docker Socket. During this talk he will explain the vulnerability and demo exploiting a Docker environment.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Content Devloper at Offensive Security, and was previously the Penetration Testing Team Lead at Early Warning. He enjoys teaching and mentoring others in security. His current interests involve tinkering with IoT, home automation, and competing in CTFs.  Outside of technology, he enjoys playing soccer, woodworking, and gardening. He recently adopted a 3 year old Greyhound named Bellini.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2018 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''November 07, 2018 (6:30PM-7:30PM) - Women in Security'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Marija Strazdas&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': In this session, Marija will talk on the tech world from a woman’s point of view, discussing how she got to where she is today, how Mentoring and Passion are what really propel you forward, (along with helping you pay it forward!), and of course, she’ll talk about Security.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Marija Strazdas''' Marija has over 15 years of experience in technology, spanning from data center &amp;amp; cloud infrastructure, to software development, to security and compliance, including DR architecture. Marija has worked as a Principal Architect in Managed Hosting at NaviSite, and as both a Tier 1 and Tier 3 Systems Engineer at Lucent, along with SE roles at Telcordia/Bell Labs and Mobilcom. This experience has allowed her to develop a deep understanding of business’ requirements of both security and availability, meshing perfectly with AlertLogic’s solutions and mission.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October 25, 2018 (6:00 - 10:00) - CMD +  CTRL Web App Capture The Flag Hackathon, Training, Mentoring'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Security Innovations, Joaquin Fuentes &amp;amp; the Early Warning Penetration Testing Team &amp;quot;Savage Submarine&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Unique in the industry, CMD+CTRL is an immersive and fun learning environment where you will exploit your way through hundreds of vulnerabilities that lurk in business applications today – and learn quickly that attack and defense are about thinking on your feet. Unlike gamification that mimics how an application should respond, CMD+CTRL comprises real websites, traffic, technologies, and vulnerabilities that represent actual application behavior. This unmatched realism brings the immediate gratification and long-term memory benefits of “learning by doing&amp;quot; that teams need in order to protect the enterprise.&lt;br /&gt;
&lt;br /&gt;
Security Innovation Will Provide&lt;br /&gt;
&lt;br /&gt;
Experts to lead attendees through this training session and hackathon which will introduce participants to core security concepts and provide insight into how hackers break into a web site leveraging common vulnerabilities, insecure practices and more!&lt;br /&gt;
&lt;br /&gt;
This workshop is ideal for all skill levels – beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CMD+CTRL platform: a fully-featured Shadow Bank financial application to practice situational awareness like an attacker.&lt;br /&gt;
&lt;br /&gt;
Participants Will Need&lt;br /&gt;
&lt;br /&gt;
A laptop to connect to our CMD+CTRL website…and your evil streak!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''June 20, 2018 (6:15PM-7:45PM) - Practical IOT Exploitation - How to get started hacking IOT'''&lt;br /&gt;
&lt;br /&gt;
''Presenter:'' Aditya Gupta&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': In this session, attendees will gain an in-depth understanding of the security vulnerabilities in the Internet of Things devices around us, how they can find vulnerabilities and exploit them. If you have never done IoT Exploitation or penetration testing of IoT devices earlier, this talk will help you get started.&lt;br /&gt;
&lt;br /&gt;
We will be mostly focusing on Smart Home devices, but the techniques would apply to pretty much any IoT device that you will encounter.&lt;br /&gt;
&lt;br /&gt;
Some of the topics that we will look at are:&lt;br /&gt;
&lt;br /&gt;
1. Exploiting Communication protocols&lt;br /&gt;
2. Hardware hacking for IoT devices&lt;br /&gt;
3. Firmware RE techniques and Exploitation&lt;br /&gt;
&lt;br /&gt;
The talk contains both live demonstrations exploiting IoT components and would also share insights on the methodology to be used in order to perform pentesting of IoT devices.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Aditya Gupta''' is the founder of Attify, a specialized security firm offering training and penetration testing services for Internet of Things devices. He is also the author of IoT Hackers Handbook and IoT Pentesting Cookbook and has delivered talks and training at conferences such as BlackHat, DefCon, OWASP AppSec, Toorcon and others. His most recent project is the IoT Exploitation Learning Kit – a self-learning training solution to help security enthusiasts learn about IoT pentesting and gain hands-on experience of the tools and tactics.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''April 05, 2018 (6:30PM-7:45PM) - Lightning Talks on Cool OWASP Projects'''&lt;br /&gt;
&lt;br /&gt;
''Presenters: Joaquin Fuentes, Dejan Zelic, Alex Boyle, Michael McCambridge''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Four speakers will provide brief talks and demonstrations on &amp;quot;cool&amp;quot; OWASP application security projects that you may not have taken the time to explore on your own. Join us to do some people networking and to get the cliff notes on projects we think are worth sharing. This is your opportunity to learn about application security through other security professional's experiences.&lt;br /&gt;
&lt;br /&gt;
Each talk will last about 10 minutes. There will be time for Q&amp;amp;A as well. We'll have a post-meeting happy hour at the Vig McDowell Mtn. Ranch for those that are interested in continuing the discussions.&lt;br /&gt;
&lt;br /&gt;
'''Speakers &amp;amp; Topics''':&lt;br /&gt;
&lt;br /&gt;
Joaquin Fuentes - Juice Shop&lt;br /&gt;
&lt;br /&gt;
Dejan Zelic - ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
Alex Boyle - ZAP (Zed Attack Proxy)&lt;br /&gt;
&lt;br /&gt;
Mike McCambridge - Application Security Verification Standard&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Joaquin Fuentes''' manages Penetration Testing, Cyber Threat Intelligence and Incident Response at Early Warning. He has practical experience performing full scope penetration tests including web, app, network, physical and social engineering as a consultant at IBM &amp;amp; SunGard. In his free time, he enjoys traveling, photography and flying drones.&lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Penetration Testing team lead at Early Warning.&lt;br /&gt;
&lt;br /&gt;
'''Alex Boyle''' works as a Security Penetration Tester for Early Warning Services in Scottsdale, AZ. The majority of his security assessments focus on web based technologies, open source intelligence gathering (OSINT), and social engineering. He is a senior at ASU completing his online Information Technology bachelors.&lt;br /&gt;
&lt;br /&gt;
'''Michael McCambridge''' is a penetration tester in his 5th year at Early Warning. He entered the security field after graduate studies in Computer Science at the University of Arizona. A mechanical engineer in a former life, Mike finds pentesting to be a whole lot more fun!&lt;br /&gt;
&lt;br /&gt;
'''March 06, 2018 (6:30PM-7:45PM) - 10 Mistakes Security Engineers Make'''&lt;br /&gt;
&lt;br /&gt;
''Presenter: Damilare D. Fagbemi, Security Architect at Intel Corporation''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Let’s face it, product security isn’t going anywhere anytime soon. Product security increasingly occurs by the minute as software houses build infrastructure to allow the provision of hourly software updates. Software isn’t just everywhere, the manner in which it’s designed is also a moving target. Considering all that churn, it’s unsurprising that information security related roles are one of the hottest items on the job market.But those jobs stay hot, because we just don’t have enough people with the necessary skills. This results in a dependence on relatively few security experts in most organizations – and those experts often need to scale to a large number of product teams.&lt;br /&gt;
&lt;br /&gt;
How can security engineers succeed and scale effectively? To answer that question, we peeled back the different layers of the product security engineering role. We explored how the security engineer approaches projects, interacts with teams, trains developers, communicates with management, assesses business risk and tackles other problems. Post analysis, we arrived at a set tips which we’re calling the Don’ts (and Dos) of the trade.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Damilare D. Fagbemi'''  is a Security Architect at Intel Corporation, where he has the pleasure of working with talented software teams to drive and improve product security in mobile, web, and IoT solutions. He is also a Chapter leader at the Open Web Application Security Project (OWASP) in Nigeria, and a former Co-founder of verdeinfotech.com, a web development consultancy. He enjoys writing and blogs at edgeofus.com. When he’s not stuck in a computer, he can be found exploring nature and trying to stay active without a fitness tracker.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252361</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252361"/>
				<updated>2019-06-11T16:39:31Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2018 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2-day conference is in Mesa, AZ December 6 &amp;amp; 7. Registration and volunteer information can be found here:'&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;https://www.cactuscon.com&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2019 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2019 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''June 19, 2019 (6:30PM-7:45PM) - The Danger of Exposing docker.sock'''&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.meetup.com/OWASP-Phoenix/events/262095694/&lt;br /&gt;
&lt;br /&gt;
''Presenter:'' Dejan Zelic&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Common containers such as traefik, nginx-proxy (jwilder), Netdata, vamp, and many more recommend exposing the Docker socket within the container. This configuration could allow for privilege and horizontal escalation in a Docker environment. Other services, like Portainer, could leave the entire host and other containers exposed on the Internet. In a recent blog post, Dejan explained the dangers of exposing the Docker Socket. During this talk he will explain the vulnerability and demo exploiting a Docker environment.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Content Devloper at Offensive Security, and was previously the Penetration Testing Team Lead at Early Warning. He enjoys teaching and mentoring others in security. His current interests involve tinkering with IoT, home automation, and competing in CTFs.  Outside of technology, he enjoys playing soccer, woodworking, and gardening. He recently adopted a 3 year old Greyhound named Bellini.&lt;br /&gt;
== 2018 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''November 07, 2018 (6:30PM-7:30PM) - Women in Security'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Marija Strazdas&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': In this session, Marija will talk on the tech world from a woman’s point of view, discussing how she got to where she is today, how Mentoring and Passion are what really propel you forward, (along with helping you pay it forward!), and of course, she’ll talk about Security.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Marija Strazdas''' Marija has over 15 years of experience in technology, spanning from data center &amp;amp; cloud infrastructure, to software development, to security and compliance, including DR architecture. Marija has worked as a Principal Architect in Managed Hosting at NaviSite, and as both a Tier 1 and Tier 3 Systems Engineer at Lucent, along with SE roles at Telcordia/Bell Labs and Mobilcom. This experience has allowed her to develop a deep understanding of business’ requirements of both security and availability, meshing perfectly with AlertLogic’s solutions and mission.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October 25, 2018 (6:00 - 10:00) - CMD +  CTRL Web App Capture The Flag Hackathon, Training, Mentoring'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Security Innovations, Joaquin Fuentes &amp;amp; the Early Warning Penetration Testing Team &amp;quot;Savage Submarine&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Unique in the industry, CMD+CTRL is an immersive and fun learning environment where you will exploit your way through hundreds of vulnerabilities that lurk in business applications today – and learn quickly that attack and defense are about thinking on your feet. Unlike gamification that mimics how an application should respond, CMD+CTRL comprises real websites, traffic, technologies, and vulnerabilities that represent actual application behavior. This unmatched realism brings the immediate gratification and long-term memory benefits of “learning by doing&amp;quot; that teams need in order to protect the enterprise.&lt;br /&gt;
&lt;br /&gt;
Security Innovation Will Provide&lt;br /&gt;
&lt;br /&gt;
Experts to lead attendees through this training session and hackathon which will introduce participants to core security concepts and provide insight into how hackers break into a web site leveraging common vulnerabilities, insecure practices and more!&lt;br /&gt;
&lt;br /&gt;
This workshop is ideal for all skill levels – beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CMD+CTRL platform: a fully-featured Shadow Bank financial application to practice situational awareness like an attacker.&lt;br /&gt;
&lt;br /&gt;
Participants Will Need&lt;br /&gt;
&lt;br /&gt;
A laptop to connect to our CMD+CTRL website…and your evil streak!&lt;br /&gt;
&lt;br /&gt;
'''April 05, 2018 (6:30PM-7:45PM) - Lightning Talks on Cool OWASP Projects'''&lt;br /&gt;
&lt;br /&gt;
''Presenters: Joaquin Fuentes, Dejan Zelic, Alex Boyle, Michael McCambridge''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Four speakers will provide brief talks and demonstrations on &amp;quot;cool&amp;quot; OWASP application security projects that you may not have taken the time to explore on your own. Join us to do some people networking and to get the cliff notes on projects we think are worth sharing. This is your opportunity to learn about application security through other security professional's experiences.&lt;br /&gt;
&lt;br /&gt;
Each talk will last about 10 minutes. There will be time for Q&amp;amp;A as well. We'll have a post-meeting happy hour at the Vig McDowell Mtn. Ranch for those that are interested in continuing the discussions.&lt;br /&gt;
&lt;br /&gt;
'''Speakers &amp;amp; Topics''':&lt;br /&gt;
&lt;br /&gt;
Joaquin Fuentes - Juice Shop&lt;br /&gt;
&lt;br /&gt;
Dejan Zelic - ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
Alex Boyle - ZAP (Zed Attack Proxy)&lt;br /&gt;
&lt;br /&gt;
Mike McCambridge - Application Security Verification Standard&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Joaquin Fuentes''' manages Penetration Testing, Cyber Threat Intelligence and Incident Response at Early Warning. He has practical experience performing full scope penetration tests including web, app, network, physical and social engineering as a consultant at IBM &amp;amp; SunGard. In his free time, he enjoys traveling, photography and flying drones.&lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Penetration Testing team lead at Early Warning.&lt;br /&gt;
&lt;br /&gt;
'''Alex Boyle''' works as a Security Penetration Tester for Early Warning Services in Scottsdale, AZ. The majority of his security assessments focus on web based technologies, open source intelligence gathering (OSINT), and social engineering. He is a senior at ASU completing his online Information Technology bachelors.&lt;br /&gt;
&lt;br /&gt;
'''Michael McCambridge''' is a penetration tester in his 5th year at Early Warning. He entered the security field after graduate studies in Computer Science at the University of Arizona. A mechanical engineer in a former life, Mike finds pentesting to be a whole lot more fun!&lt;br /&gt;
&lt;br /&gt;
'''March 06, 2018 (6:30PM-7:45PM) - 10 Mistakes Security Engineers Make'''&lt;br /&gt;
&lt;br /&gt;
''Presenter: Damilare D. Fagbemi, Security Architect at Intel Corporation''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Let’s face it, product security isn’t going anywhere anytime soon. Product security increasingly occurs by the minute as software houses build infrastructure to allow the provision of hourly software updates. Software isn’t just everywhere, the manner in which it’s designed is also a moving target. Considering all that churn, it’s unsurprising that information security related roles are one of the hottest items on the job market.But those jobs stay hot, because we just don’t have enough people with the necessary skills. This results in a dependence on relatively few security experts in most organizations – and those experts often need to scale to a large number of product teams.&lt;br /&gt;
&lt;br /&gt;
How can security engineers succeed and scale effectively? To answer that question, we peeled back the different layers of the product security engineering role. We explored how the security engineer approaches projects, interacts with teams, trains developers, communicates with management, assesses business risk and tackles other problems. Post analysis, we arrived at a set tips which we’re calling the Don’ts (and Dos) of the trade.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Damilare D. Fagbemi'''  is a Security Architect at Intel Corporation, where he has the pleasure of working with talented software teams to drive and improve product security in mobile, web, and IoT solutions. He is also a Chapter leader at the Open Web Application Security Project (OWASP) in Nigeria, and a former Co-founder of verdeinfotech.com, a web development consultancy. He enjoys writing and blogs at edgeofus.com. When he’s not stuck in a computer, he can be found exploring nature and trying to stay active without a fitness tracker.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252154</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252154"/>
				<updated>2019-06-06T15:20:56Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2019 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2018 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2-day conference is in Mesa, AZ December 6 &amp;amp; 7. Registration and volunteer information can be found here:'&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;https://www.cactuscon.com&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2019 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2019 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''June 20, 2019 (6:30PM-7:45PM) - The Danger of Exposing docker.sock'''&lt;br /&gt;
&lt;br /&gt;
RSVP: https://www.meetup.com/OWASP-Phoenix/events/262095694/&lt;br /&gt;
&lt;br /&gt;
''Presenter:'' Dejan Zelic&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Common containers such as traefik, nginx-proxy (jwilder), Netdata, vamp, and many more recommend exposing the Docker socket within the container. This configuration could allow for privilege and horizontal escalation in a Docker environment. Other services, like Portainer, could leave the entire host and other containers exposed on the Internet. In a recent blog post, Dejan explained the dangers of exposing the Docker Socket. During this talk he will explain the vulnerability and demo exploiting a Docker environment.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Content Devloper at Offensive Security, and was previously the Penetration Testing Team Lead at Early Warning. He enjoys teaching and mentoring others in security. His current interests involve tinkering with IoT, home automation, and competing in CTFs.  Outside of technology, he enjoys playing soccer, woodworking, and gardening. He recently adopted a 3 year old Greyhound named Bellini.&lt;br /&gt;
== 2018 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''November 07, 2018 (6:30PM-7:30PM) - Women in Security'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Marija Strazdas&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': In this session, Marija will talk on the tech world from a woman’s point of view, discussing how she got to where she is today, how Mentoring and Passion are what really propel you forward, (along with helping you pay it forward!), and of course, she’ll talk about Security.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Marija Strazdas''' Marija has over 15 years of experience in technology, spanning from data center &amp;amp; cloud infrastructure, to software development, to security and compliance, including DR architecture. Marija has worked as a Principal Architect in Managed Hosting at NaviSite, and as both a Tier 1 and Tier 3 Systems Engineer at Lucent, along with SE roles at Telcordia/Bell Labs and Mobilcom. This experience has allowed her to develop a deep understanding of business’ requirements of both security and availability, meshing perfectly with AlertLogic’s solutions and mission.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October 25, 2018 (6:00 - 10:00) - CMD +  CTRL Web App Capture The Flag Hackathon, Training, Mentoring'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Security Innovations, Joaquin Fuentes &amp;amp; the Early Warning Penetration Testing Team &amp;quot;Savage Submarine&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Unique in the industry, CMD+CTRL is an immersive and fun learning environment where you will exploit your way through hundreds of vulnerabilities that lurk in business applications today – and learn quickly that attack and defense are about thinking on your feet. Unlike gamification that mimics how an application should respond, CMD+CTRL comprises real websites, traffic, technologies, and vulnerabilities that represent actual application behavior. This unmatched realism brings the immediate gratification and long-term memory benefits of “learning by doing&amp;quot; that teams need in order to protect the enterprise.&lt;br /&gt;
&lt;br /&gt;
Security Innovation Will Provide&lt;br /&gt;
&lt;br /&gt;
Experts to lead attendees through this training session and hackathon which will introduce participants to core security concepts and provide insight into how hackers break into a web site leveraging common vulnerabilities, insecure practices and more!&lt;br /&gt;
&lt;br /&gt;
This workshop is ideal for all skill levels – beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CMD+CTRL platform: a fully-featured Shadow Bank financial application to practice situational awareness like an attacker.&lt;br /&gt;
&lt;br /&gt;
Participants Will Need&lt;br /&gt;
&lt;br /&gt;
A laptop to connect to our CMD+CTRL website…and your evil streak!&lt;br /&gt;
&lt;br /&gt;
'''April 05, 2018 (6:30PM-7:45PM) - Lightning Talks on Cool OWASP Projects'''&lt;br /&gt;
&lt;br /&gt;
''Presenters: Joaquin Fuentes, Dejan Zelic, Alex Boyle, Michael McCambridge''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Four speakers will provide brief talks and demonstrations on &amp;quot;cool&amp;quot; OWASP application security projects that you may not have taken the time to explore on your own. Join us to do some people networking and to get the cliff notes on projects we think are worth sharing. This is your opportunity to learn about application security through other security professional's experiences.&lt;br /&gt;
&lt;br /&gt;
Each talk will last about 10 minutes. There will be time for Q&amp;amp;A as well. We'll have a post-meeting happy hour at the Vig McDowell Mtn. Ranch for those that are interested in continuing the discussions.&lt;br /&gt;
&lt;br /&gt;
'''Speakers &amp;amp; Topics''':&lt;br /&gt;
&lt;br /&gt;
Joaquin Fuentes - Juice Shop&lt;br /&gt;
&lt;br /&gt;
Dejan Zelic - ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
Alex Boyle - ZAP (Zed Attack Proxy)&lt;br /&gt;
&lt;br /&gt;
Mike McCambridge - Application Security Verification Standard&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Joaquin Fuentes''' manages Penetration Testing, Cyber Threat Intelligence and Incident Response at Early Warning. He has practical experience performing full scope penetration tests including web, app, network, physical and social engineering as a consultant at IBM &amp;amp; SunGard. In his free time, he enjoys traveling, photography and flying drones.&lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Penetration Testing team lead at Early Warning.&lt;br /&gt;
&lt;br /&gt;
'''Alex Boyle''' works as a Security Penetration Tester for Early Warning Services in Scottsdale, AZ. The majority of his security assessments focus on web based technologies, open source intelligence gathering (OSINT), and social engineering. He is a senior at ASU completing his online Information Technology bachelors.&lt;br /&gt;
&lt;br /&gt;
'''Michael McCambridge''' is a penetration tester in his 5th year at Early Warning. He entered the security field after graduate studies in Computer Science at the University of Arizona. A mechanical engineer in a former life, Mike finds pentesting to be a whole lot more fun!&lt;br /&gt;
&lt;br /&gt;
'''March 06, 2018 (6:30PM-7:45PM) - 10 Mistakes Security Engineers Make'''&lt;br /&gt;
&lt;br /&gt;
''Presenter: Damilare D. Fagbemi, Security Architect at Intel Corporation''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Let’s face it, product security isn’t going anywhere anytime soon. Product security increasingly occurs by the minute as software houses build infrastructure to allow the provision of hourly software updates. Software isn’t just everywhere, the manner in which it’s designed is also a moving target. Considering all that churn, it’s unsurprising that information security related roles are one of the hottest items on the job market.But those jobs stay hot, because we just don’t have enough people with the necessary skills. This results in a dependence on relatively few security experts in most organizations – and those experts often need to scale to a large number of product teams.&lt;br /&gt;
&lt;br /&gt;
How can security engineers succeed and scale effectively? To answer that question, we peeled back the different layers of the product security engineering role. We explored how the security engineer approaches projects, interacts with teams, trains developers, communicates with management, assesses business risk and tackles other problems. Post analysis, we arrived at a set tips which we’re calling the Don’ts (and Dos) of the trade.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Damilare D. Fagbemi'''  is a Security Architect at Intel Corporation, where he has the pleasure of working with talented software teams to drive and improve product security in mobile, web, and IoT solutions. He is also a Chapter leader at the Open Web Application Security Project (OWASP) in Nigeria, and a former Co-founder of verdeinfotech.com, a web development consultancy. He enjoys writing and blogs at edgeofus.com. When he’s not stuck in a computer, he can be found exploring nature and trying to stay active without a fitness tracker.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252153</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252153"/>
				<updated>2019-06-06T15:19:31Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2019 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2018 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2-day conference is in Mesa, AZ December 6 &amp;amp; 7. Registration and volunteer information can be found here:'&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;https://www.cactuscon.com&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2019 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2019 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''June 20, 2019 (6:30PM-7:45PM) - The Danger of Exposing docker.sock'''&lt;br /&gt;
&lt;br /&gt;
''Presenter:'' Dejan Zelic&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Common containers such as traefik, nginx-proxy (jwilder), Netdata, vamp, and many more recommend exposing the Docker socket within the container. This configuration could allow for privilege and horizontal escalation in a Docker environment. Other services, like Portainer, could leave the entire host and other containers exposed on the Internet. In a recent blog post, Dejan explained the dangers of exposing the Docker Socket. During this talk he will explain the vulnerability and demo exploiting a Docker environment.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Content Devloper at Offensive Security, and was previously the Penetration Testing Team Lead at Early Warning. He enjoys teaching and mentoring others in security. His current interests involve tinkering with IoT, home automation, and competing in CTFs.  Outside of technology, he enjoys playing soccer, woodworking, and gardening. He recently adopted a 3 year old Greyhound named Bellini.&lt;br /&gt;
== 2018 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''November 07, 2018 (6:30PM-7:30PM) - Women in Security'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Marija Strazdas&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': In this session, Marija will talk on the tech world from a woman’s point of view, discussing how she got to where she is today, how Mentoring and Passion are what really propel you forward, (along with helping you pay it forward!), and of course, she’ll talk about Security.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Marija Strazdas''' Marija has over 15 years of experience in technology, spanning from data center &amp;amp; cloud infrastructure, to software development, to security and compliance, including DR architecture. Marija has worked as a Principal Architect in Managed Hosting at NaviSite, and as both a Tier 1 and Tier 3 Systems Engineer at Lucent, along with SE roles at Telcordia/Bell Labs and Mobilcom. This experience has allowed her to develop a deep understanding of business’ requirements of both security and availability, meshing perfectly with AlertLogic’s solutions and mission.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October 25, 2018 (6:00 - 10:00) - CMD +  CTRL Web App Capture The Flag Hackathon, Training, Mentoring'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Security Innovations, Joaquin Fuentes &amp;amp; the Early Warning Penetration Testing Team &amp;quot;Savage Submarine&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Unique in the industry, CMD+CTRL is an immersive and fun learning environment where you will exploit your way through hundreds of vulnerabilities that lurk in business applications today – and learn quickly that attack and defense are about thinking on your feet. Unlike gamification that mimics how an application should respond, CMD+CTRL comprises real websites, traffic, technologies, and vulnerabilities that represent actual application behavior. This unmatched realism brings the immediate gratification and long-term memory benefits of “learning by doing&amp;quot; that teams need in order to protect the enterprise.&lt;br /&gt;
&lt;br /&gt;
Security Innovation Will Provide&lt;br /&gt;
&lt;br /&gt;
Experts to lead attendees through this training session and hackathon which will introduce participants to core security concepts and provide insight into how hackers break into a web site leveraging common vulnerabilities, insecure practices and more!&lt;br /&gt;
&lt;br /&gt;
This workshop is ideal for all skill levels – beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CMD+CTRL platform: a fully-featured Shadow Bank financial application to practice situational awareness like an attacker.&lt;br /&gt;
&lt;br /&gt;
Participants Will Need&lt;br /&gt;
&lt;br /&gt;
A laptop to connect to our CMD+CTRL website…and your evil streak!&lt;br /&gt;
&lt;br /&gt;
'''April 05, 2018 (6:30PM-7:45PM) - Lightning Talks on Cool OWASP Projects'''&lt;br /&gt;
&lt;br /&gt;
''Presenters: Joaquin Fuentes, Dejan Zelic, Alex Boyle, Michael McCambridge''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Four speakers will provide brief talks and demonstrations on &amp;quot;cool&amp;quot; OWASP application security projects that you may not have taken the time to explore on your own. Join us to do some people networking and to get the cliff notes on projects we think are worth sharing. This is your opportunity to learn about application security through other security professional's experiences.&lt;br /&gt;
&lt;br /&gt;
Each talk will last about 10 minutes. There will be time for Q&amp;amp;A as well. We'll have a post-meeting happy hour at the Vig McDowell Mtn. Ranch for those that are interested in continuing the discussions.&lt;br /&gt;
&lt;br /&gt;
'''Speakers &amp;amp; Topics''':&lt;br /&gt;
&lt;br /&gt;
Joaquin Fuentes - Juice Shop&lt;br /&gt;
&lt;br /&gt;
Dejan Zelic - ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
Alex Boyle - ZAP (Zed Attack Proxy)&lt;br /&gt;
&lt;br /&gt;
Mike McCambridge - Application Security Verification Standard&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Joaquin Fuentes''' manages Penetration Testing, Cyber Threat Intelligence and Incident Response at Early Warning. He has practical experience performing full scope penetration tests including web, app, network, physical and social engineering as a consultant at IBM &amp;amp; SunGard. In his free time, he enjoys traveling, photography and flying drones.&lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Penetration Testing team lead at Early Warning.&lt;br /&gt;
&lt;br /&gt;
'''Alex Boyle''' works as a Security Penetration Tester for Early Warning Services in Scottsdale, AZ. The majority of his security assessments focus on web based technologies, open source intelligence gathering (OSINT), and social engineering. He is a senior at ASU completing his online Information Technology bachelors.&lt;br /&gt;
&lt;br /&gt;
'''Michael McCambridge''' is a penetration tester in his 5th year at Early Warning. He entered the security field after graduate studies in Computer Science at the University of Arizona. A mechanical engineer in a former life, Mike finds pentesting to be a whole lot more fun!&lt;br /&gt;
&lt;br /&gt;
'''March 06, 2018 (6:30PM-7:45PM) - 10 Mistakes Security Engineers Make'''&lt;br /&gt;
&lt;br /&gt;
''Presenter: Damilare D. Fagbemi, Security Architect at Intel Corporation''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Let’s face it, product security isn’t going anywhere anytime soon. Product security increasingly occurs by the minute as software houses build infrastructure to allow the provision of hourly software updates. Software isn’t just everywhere, the manner in which it’s designed is also a moving target. Considering all that churn, it’s unsurprising that information security related roles are one of the hottest items on the job market.But those jobs stay hot, because we just don’t have enough people with the necessary skills. This results in a dependence on relatively few security experts in most organizations – and those experts often need to scale to a large number of product teams.&lt;br /&gt;
&lt;br /&gt;
How can security engineers succeed and scale effectively? To answer that question, we peeled back the different layers of the product security engineering role. We explored how the security engineer approaches projects, interacts with teams, trains developers, communicates with management, assesses business risk and tackles other problems. Post analysis, we arrived at a set tips which we’re calling the Don’ts (and Dos) of the trade.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Damilare D. Fagbemi'''  is a Security Architect at Intel Corporation, where he has the pleasure of working with talented software teams to drive and improve product security in mobile, web, and IoT solutions. He is also a Chapter leader at the Open Web Application Security Project (OWASP) in Nigeria, and a former Co-founder of verdeinfotech.com, a web development consultancy. He enjoys writing and blogs at edgeofus.com. When he’s not stuck in a computer, he can be found exploring nature and trying to stay active without a fitness tracker.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252152</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252152"/>
				<updated>2019-06-06T15:16:41Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2018 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2-day conference is in Mesa, AZ December 6 &amp;amp; 7. Registration and volunteer information can be found here:'&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;https://www.cactuscon.com&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2019 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2019 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''November 07, 2018 (6:30PM-7:30PM) - Women in Security'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Marija Strazdas&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2018 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''November 07, 2018 (6:30PM-7:30PM) - Women in Security'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Marija Strazdas&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': In this session, Marija will talk on the tech world from a woman’s point of view, discussing how she got to where she is today, how Mentoring and Passion are what really propel you forward, (along with helping you pay it forward!), and of course, she’ll talk about Security.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Marija Strazdas''' Marija has over 15 years of experience in technology, spanning from data center &amp;amp; cloud infrastructure, to software development, to security and compliance, including DR architecture. Marija has worked as a Principal Architect in Managed Hosting at NaviSite, and as both a Tier 1 and Tier 3 Systems Engineer at Lucent, along with SE roles at Telcordia/Bell Labs and Mobilcom. This experience has allowed her to develop a deep understanding of business’ requirements of both security and availability, meshing perfectly with AlertLogic’s solutions and mission.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October 25, 2018 (6:00 - 10:00) - CMD +  CTRL Web App Capture The Flag Hackathon, Training, Mentoring'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Security Innovations, Joaquin Fuentes &amp;amp; the Early Warning Penetration Testing Team &amp;quot;Savage Submarine&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Unique in the industry, CMD+CTRL is an immersive and fun learning environment where you will exploit your way through hundreds of vulnerabilities that lurk in business applications today – and learn quickly that attack and defense are about thinking on your feet. Unlike gamification that mimics how an application should respond, CMD+CTRL comprises real websites, traffic, technologies, and vulnerabilities that represent actual application behavior. This unmatched realism brings the immediate gratification and long-term memory benefits of “learning by doing&amp;quot; that teams need in order to protect the enterprise.&lt;br /&gt;
&lt;br /&gt;
Security Innovation Will Provide&lt;br /&gt;
&lt;br /&gt;
Experts to lead attendees through this training session and hackathon which will introduce participants to core security concepts and provide insight into how hackers break into a web site leveraging common vulnerabilities, insecure practices and more!&lt;br /&gt;
&lt;br /&gt;
This workshop is ideal for all skill levels – beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CMD+CTRL platform: a fully-featured Shadow Bank financial application to practice situational awareness like an attacker.&lt;br /&gt;
&lt;br /&gt;
Participants Will Need&lt;br /&gt;
&lt;br /&gt;
A laptop to connect to our CMD+CTRL website…and your evil streak!&lt;br /&gt;
&lt;br /&gt;
'''April 05, 2018 (6:30PM-7:45PM) - Lightning Talks on Cool OWASP Projects'''&lt;br /&gt;
&lt;br /&gt;
''Presenters: Joaquin Fuentes, Dejan Zelic, Alex Boyle, Michael McCambridge''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Four speakers will provide brief talks and demonstrations on &amp;quot;cool&amp;quot; OWASP application security projects that you may not have taken the time to explore on your own. Join us to do some people networking and to get the cliff notes on projects we think are worth sharing. This is your opportunity to learn about application security through other security professional's experiences.&lt;br /&gt;
&lt;br /&gt;
Each talk will last about 10 minutes. There will be time for Q&amp;amp;A as well. We'll have a post-meeting happy hour at the Vig McDowell Mtn. Ranch for those that are interested in continuing the discussions.&lt;br /&gt;
&lt;br /&gt;
'''Speakers &amp;amp; Topics''':&lt;br /&gt;
&lt;br /&gt;
Joaquin Fuentes - Juice Shop&lt;br /&gt;
&lt;br /&gt;
Dejan Zelic - ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
Alex Boyle - ZAP (Zed Attack Proxy)&lt;br /&gt;
&lt;br /&gt;
Mike McCambridge - Application Security Verification Standard&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Joaquin Fuentes''' manages Penetration Testing, Cyber Threat Intelligence and Incident Response at Early Warning. He has practical experience performing full scope penetration tests including web, app, network, physical and social engineering as a consultant at IBM &amp;amp; SunGard. In his free time, he enjoys traveling, photography and flying drones.&lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Penetration Testing team lead at Early Warning.&lt;br /&gt;
&lt;br /&gt;
'''Alex Boyle''' works as a Security Penetration Tester for Early Warning Services in Scottsdale, AZ. The majority of his security assessments focus on web based technologies, open source intelligence gathering (OSINT), and social engineering. He is a senior at ASU completing his online Information Technology bachelors.&lt;br /&gt;
&lt;br /&gt;
'''Michael McCambridge''' is a penetration tester in his 5th year at Early Warning. He entered the security field after graduate studies in Computer Science at the University of Arizona. A mechanical engineer in a former life, Mike finds pentesting to be a whole lot more fun!&lt;br /&gt;
&lt;br /&gt;
'''March 06, 2018 (6:30PM-7:45PM) - 10 Mistakes Security Engineers Make'''&lt;br /&gt;
&lt;br /&gt;
''Presenter: Damilare D. Fagbemi, Security Architect at Intel Corporation''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Let’s face it, product security isn’t going anywhere anytime soon. Product security increasingly occurs by the minute as software houses build infrastructure to allow the provision of hourly software updates. Software isn’t just everywhere, the manner in which it’s designed is also a moving target. Considering all that churn, it’s unsurprising that information security related roles are one of the hottest items on the job market.But those jobs stay hot, because we just don’t have enough people with the necessary skills. This results in a dependence on relatively few security experts in most organizations – and those experts often need to scale to a large number of product teams.&lt;br /&gt;
&lt;br /&gt;
How can security engineers succeed and scale effectively? To answer that question, we peeled back the different layers of the product security engineering role. We explored how the security engineer approaches projects, interacts with teams, trains developers, communicates with management, assesses business risk and tackles other problems. Post analysis, we arrived at a set tips which we’re calling the Don’ts (and Dos) of the trade.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Damilare D. Fagbemi'''  is a Security Architect at Intel Corporation, where he has the pleasure of working with talented software teams to drive and improve product security in mobile, web, and IoT solutions. He is also a Chapter leader at the Open Web Application Security Project (OWASP) in Nigeria, and a former Co-founder of verdeinfotech.com, a web development consultancy. He enjoys writing and blogs at edgeofus.com. When he’s not stuck in a computer, he can be found exploring nature and trying to stay active without a fitness tracker.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252151</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=252151"/>
				<updated>2019-06-06T14:40:12Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* OWASP Phoenix -- */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2018 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2-day conference is in Mesa, AZ December 6 &amp;amp; 7. Registration and volunteer information can be found here:'&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;https://www.cactuscon.com&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2019 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2018 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&lt;br /&gt;
&lt;br /&gt;
'''November 07, 2018 (6:30PM-7:30PM) - Women in Security'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Marija Strazdas&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': In this session, Marija will talk on the tech world from a woman’s point of view, discussing how she got to where she is today, how Mentoring and Passion are what really propel you forward, (along with helping you pay it forward!), and of course, she’ll talk about Security.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': &lt;br /&gt;
&lt;br /&gt;
'''Marija Strazdas''' Marija has over 15 years of experience in technology, spanning from data center &amp;amp; cloud infrastructure, to software development, to security and compliance, including DR architecture. Marija has worked as a Principal Architect in Managed Hosting at NaviSite, and as both a Tier 1 and Tier 3 Systems Engineer at Lucent, along with SE roles at Telcordia/Bell Labs and Mobilcom. This experience has allowed her to develop a deep understanding of business’ requirements of both security and availability, meshing perfectly with AlertLogic’s solutions and mission.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''October 25, 2018 (6:00 - 10:00) - CMD +  CTRL Web App Capture The Flag Hackathon, Training, Mentoring'''&lt;br /&gt;
&lt;br /&gt;
''Presenters:'' Security Innovations, Joaquin Fuentes &amp;amp; the Early Warning Penetration Testing Team &amp;quot;Savage Submarine&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Unique in the industry, CMD+CTRL is an immersive and fun learning environment where you will exploit your way through hundreds of vulnerabilities that lurk in business applications today – and learn quickly that attack and defense are about thinking on your feet. Unlike gamification that mimics how an application should respond, CMD+CTRL comprises real websites, traffic, technologies, and vulnerabilities that represent actual application behavior. This unmatched realism brings the immediate gratification and long-term memory benefits of “learning by doing&amp;quot; that teams need in order to protect the enterprise.&lt;br /&gt;
&lt;br /&gt;
Security Innovation Will Provide&lt;br /&gt;
&lt;br /&gt;
Experts to lead attendees through this training session and hackathon which will introduce participants to core security concepts and provide insight into how hackers break into a web site leveraging common vulnerabilities, insecure practices and more!&lt;br /&gt;
&lt;br /&gt;
This workshop is ideal for all skill levels – beginner to advanced.&lt;br /&gt;
&lt;br /&gt;
CMD+CTRL platform: a fully-featured Shadow Bank financial application to practice situational awareness like an attacker.&lt;br /&gt;
&lt;br /&gt;
Participants Will Need&lt;br /&gt;
&lt;br /&gt;
A laptop to connect to our CMD+CTRL website…and your evil streak!&lt;br /&gt;
&lt;br /&gt;
'''April 05, 2018 (6:30PM-7:45PM) - Lightning Talks on Cool OWASP Projects'''&lt;br /&gt;
&lt;br /&gt;
''Presenters: Joaquin Fuentes, Dejan Zelic, Alex Boyle, Michael McCambridge''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Four speakers will provide brief talks and demonstrations on &amp;quot;cool&amp;quot; OWASP application security projects that you may not have taken the time to explore on your own. Join us to do some people networking and to get the cliff notes on projects we think are worth sharing. This is your opportunity to learn about application security through other security professional's experiences.&lt;br /&gt;
&lt;br /&gt;
Each talk will last about 10 minutes. There will be time for Q&amp;amp;A as well. We'll have a post-meeting happy hour at the Vig McDowell Mtn. Ranch for those that are interested in continuing the discussions.&lt;br /&gt;
&lt;br /&gt;
'''Speakers &amp;amp; Topics''':&lt;br /&gt;
&lt;br /&gt;
Joaquin Fuentes - Juice Shop&lt;br /&gt;
&lt;br /&gt;
Dejan Zelic - ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
Alex Boyle - ZAP (Zed Attack Proxy)&lt;br /&gt;
&lt;br /&gt;
Mike McCambridge - Application Security Verification Standard&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Joaquin Fuentes''' manages Penetration Testing, Cyber Threat Intelligence and Incident Response at Early Warning. He has practical experience performing full scope penetration tests including web, app, network, physical and social engineering as a consultant at IBM &amp;amp; SunGard. In his free time, he enjoys traveling, photography and flying drones.&lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Penetration Testing team lead at Early Warning.&lt;br /&gt;
&lt;br /&gt;
'''Alex Boyle''' works as a Security Penetration Tester for Early Warning Services in Scottsdale, AZ. The majority of his security assessments focus on web based technologies, open source intelligence gathering (OSINT), and social engineering. He is a senior at ASU completing his online Information Technology bachelors.&lt;br /&gt;
&lt;br /&gt;
'''Michael McCambridge''' is a penetration tester in his 5th year at Early Warning. He entered the security field after graduate studies in Computer Science at the University of Arizona. A mechanical engineer in a former life, Mike finds pentesting to be a whole lot more fun!&lt;br /&gt;
&lt;br /&gt;
'''March 06, 2018 (6:30PM-7:45PM) - 10 Mistakes Security Engineers Make'''&lt;br /&gt;
&lt;br /&gt;
''Presenter: Damilare D. Fagbemi, Security Architect at Intel Corporation''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Let’s face it, product security isn’t going anywhere anytime soon. Product security increasingly occurs by the minute as software houses build infrastructure to allow the provision of hourly software updates. Software isn’t just everywhere, the manner in which it’s designed is also a moving target. Considering all that churn, it’s unsurprising that information security related roles are one of the hottest items on the job market.But those jobs stay hot, because we just don’t have enough people with the necessary skills. This results in a dependence on relatively few security experts in most organizations – and those experts often need to scale to a large number of product teams.&lt;br /&gt;
&lt;br /&gt;
How can security engineers succeed and scale effectively? To answer that question, we peeled back the different layers of the product security engineering role. We explored how the security engineer approaches projects, interacts with teams, trains developers, communicates with management, assesses business risk and tackles other problems. Post analysis, we arrived at a set tips which we’re calling the Don’ts (and Dos) of the trade.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Damilare D. Fagbemi'''  is a Security Architect at Intel Corporation, where he has the pleasure of working with talented software teams to drive and improve product security in mobile, web, and IoT solutions. He is also a Chapter leader at the Open Web Application Security Project (OWASP) in Nigeria, and a former Co-founder of verdeinfotech.com, a web development consultancy. He enjoys writing and blogs at edgeofus.com. When he’s not stuck in a computer, he can be found exploring nature and trying to stay active without a fitness tracker.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=239219</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=239219"/>
				<updated>2018-04-02T06:14:00Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2018 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2018 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: SecurityTitans 1-day conference is in Phoenix 02-23-2018. Registration and information can be found here:'&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;http://www.securitytitans.org&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2018 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2018 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''April 05, 2018 (6:30PM-7:45PM) - Lightning Talks on Cool OWASP Projects'''&lt;br /&gt;
&lt;br /&gt;
''Presenters: Joaquin Fuentes, Dejan Zelic, Alex Boyle, Michael McCambridge''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topics''': Four speakers will provide brief talks and demonstrations on &amp;quot;cool&amp;quot; OWASP application security projects that you may not have taken the time to explore on your own. Join us to do some people networking and to get the cliff notes on projects we think are worth sharing. This is your opportunity to learn about application security through other security professional's experiences.&lt;br /&gt;
&lt;br /&gt;
Each talk will last about 10 minutes. There will be time for Q&amp;amp;A as well. We'll have a post-meeting happy hour at the Vig McDowell Mtn. Ranch for those that are interested in continuing the discussions.&lt;br /&gt;
&lt;br /&gt;
'''Speakers &amp;amp; Topics''':&lt;br /&gt;
&lt;br /&gt;
Joaquin Fuentes - Juice Shop&lt;br /&gt;
&lt;br /&gt;
Dejan Zelic - ModSecurity Core Rule Set&lt;br /&gt;
&lt;br /&gt;
Alex Boyle - ZAP (Zed Attack Proxy)&lt;br /&gt;
&lt;br /&gt;
Mike McCambridge - Application Security Verification Standard&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Joaquin Fuentes''' manages Penetration Testing, Cyber Threat Intelligence and Incident Response at Early Warning. He has practical experience performing full scope penetration tests including web, app, network, physical and social engineering as a consultant at IBM &amp;amp; SunGard. In his free time, he enjoys traveling, photography and flying drones.&lt;br /&gt;
&lt;br /&gt;
'''Dejan Zelic''' is a Penetration Testing team lead at Early Warning.&lt;br /&gt;
&lt;br /&gt;
'''Alex Boyle''' works as a Security Penetration Tester for Early Warning Services in Scottsdale, AZ. The majority of his security assessments focus on web based technologies, open source intelligence gathering (OSINT), and social engineering. He is a senior at ASU completing his online Information Technology bachelors.&lt;br /&gt;
&lt;br /&gt;
'''Michael McCambridge''' is a penetration tester in his 5th year at Early Warning. He entered the security field after graduate studies in Computer Science at the University of Arizona. A mechanical engineer in a former life, Mike finds pentesting to be a whole lot more fun!&lt;br /&gt;
&lt;br /&gt;
'''March 06, 2018 (6:30PM-7:45PM) - 10 Mistakes Security Engineers Make'''&lt;br /&gt;
&lt;br /&gt;
''Presenter: Damilare D. Fagbemi, Security Architect at Intel Corporation''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Let’s face it, product security isn’t going anywhere anytime soon. Product security increasingly occurs by the minute as software houses build infrastructure to allow the provision of hourly software updates. Software isn’t just everywhere, the manner in which it’s designed is also a moving target. Considering all that churn, it’s unsurprising that information security related roles are one of the hottest items on the job market.But those jobs stay hot, because we just don’t have enough people with the necessary skills. This results in a dependence on relatively few security experts in most organizations – and those experts often need to scale to a large number of product teams.&lt;br /&gt;
&lt;br /&gt;
How can security engineers succeed and scale effectively? To answer that question, we peeled back the different layers of the product security engineering role. We explored how the security engineer approaches projects, interacts with teams, trains developers, communicates with management, assesses business risk and tackles other problems. Post analysis, we arrived at a set tips which we’re calling the Don’ts (and Dos) of the trade.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Damilare D. Fagbemi'''  is a Security Architect at Intel Corporation, where he has the pleasure of working with talented software teams to drive and improve product security in mobile, web, and IoT solutions. He is also a Chapter leader at the Open Web Application Security Project (OWASP) in Nigeria, and a former Co-founder of verdeinfotech.com, a web development consultancy. He enjoys writing and blogs at edgeofus.com. When he’s not stuck in a computer, he can be found exploring nature and trying to stay active without a fitness tracker.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=237880</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=237880"/>
				<updated>2018-02-18T23:31:41Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: Added March Meeting info&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2018 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: SecurityTitans 1-day conference is in Phoenix 02-23-2018. Registration and information can be found here:'&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;http://www.securitytitans.org&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2018 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2018 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''March 06, 2018 (6:30PM-7:45PM) - 10 Mistakes Security Engineers Make'''&lt;br /&gt;
&lt;br /&gt;
''Presenter: Damilare D. Fagbemi, Security Architect at Intel Corporation''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Let’s face it, product security isn’t going anywhere anytime soon. Product security increasingly occurs by the minute as software houses build infrastructure to allow the provision of hourly software updates. Software isn’t just everywhere, the manner in which it’s designed is also a moving target. Considering all that churn, it’s unsurprising that information security related roles are one of the hottest items on the job market.But those jobs stay hot, because we just don’t have enough people with the necessary skills. This results in a dependence on relatively few security experts in most organizations – and those experts often need to scale to a large number of product teams.&lt;br /&gt;
&lt;br /&gt;
How can security engineers succeed and scale effectively? To answer that question, we peeled back the different layers of the product security engineering role. We explored how the security engineer approaches projects, interacts with teams, trains developers, communicates with management, assesses business risk and tackles other problems. Post analysis, we arrived at a set tips which we’re calling the Don’ts (and Dos) of the trade.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Damilare D. Fagbemi'''  is a Security Architect at Intel Corporation, where he has the pleasure of working with talented software teams to drive and improve product security in mobile, web, and IoT solutions. He is also a Chapter leader at the Open Web Application Security Project (OWASP) in Nigeria, and a former Co-founder of verdeinfotech.com, a web development consultancy. He enjoys writing and blogs at edgeofus.com. When he’s not stuck in a computer, he can be found exploring nature and trying to stay active without a fitness tracker.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=237879</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=237879"/>
				<updated>2018-02-18T23:26:16Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* OWASP Phoenix -- */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2017 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: SecurityTitans 1-day conference is in Phoenix 02-23-2018. Registration and information can be found here:'&amp;lt;nowiki/&amp;gt;''&amp;lt;/font&amp;gt;http://www.securitytitans.org&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2018 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Fuentes.joaquin&amp;diff=231446</id>
		<title>User:Fuentes.joaquin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Fuentes.joaquin&amp;diff=231446"/>
				<updated>2017-07-07T18:02:15Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Joaquin Fuentes.jpg|thumb|Joaquin Fuentes, OWASP Phoenix Chapter Leader]]&lt;br /&gt;
As the Phoenix Chapter Leader, I enjoy giving back to the community by bringing in speakers from around the valley and the U.S.  Web Application security is one of my passions, and I have held various professional security roles, from consulting to security architecture and managing a penetration testing team. With careful planning, our chapter has had the pleasure of previewing DefCon and Blackhat talks before the conferences, and have also brought in well known AppSec leaders/speakers present, such as Jim Manico.  We've also given back to the community by having special events such as Web Application Hacking Training with the OWASP Security Shephard Project, by hosting CTFs at local universities, and by tutoring high school students within a structured security tutoring program.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Since reviving the OWASP Phoenix chapter, I've been able to grow interest to over 700+ meetup.com group members, and have on average 50-60+ attendees per chapter meeting.  To make meetings more convenient to attend, I always find a pizza sponsor, because who doesn't love free pizza.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
I have been an active member of OWASP for many years and thoroughly enjoy planting seeds of interest with every attendee.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Notably, I couldn't have done all of this without the help of my Penetration Testing team members, who are always willing to assist.  Our CTF team is &amp;quot;Savage Submarine,&amp;quot; and we're most proud of taking 1st place in the WebApp CmdNCntrl CTF at Defcon, in 2016. Other notable wins include 1st and 2nd place at the local CactusCon CTF, over the past few years.&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Fuentes.joaquin&amp;diff=231445</id>
		<title>User:Fuentes.joaquin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Fuentes.joaquin&amp;diff=231445"/>
				<updated>2017-07-07T18:00:39Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Joaquin Fuentes.jpg|thumb|Joaquin Fuentes, OWASP Phoenix Chapter Leader]]&lt;br /&gt;
As the Phoenix Chapter Leader, I enjoy giving back to the community by bringing in speakers from around the valley and the U.S.  Web Application security is one of my passions, and I have held various professional security roles, from consulting to security architecture and managing a penetration testing team. With careful planning, our chapter has had the pleasure of previewing DefCon and Blackhat talks before the conferences, and have also brought in well known AppSec leaders/speakers present, such as Jim Manico.  We've also given back to the community by having special events such as Web Application Hacking Training with the OWASP Security Shephard Project, by hosting CTFs at local universities, and by tutoring high school students within a structured security tutoring program.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;\br&amp;gt;&lt;br /&gt;
Since reviving the OWASP Phoenix chapter, I've been able to grow interest to over 700+ meetup.com group members, and have on average 50-60+ attendees per chapter meeting.  To make meetings more convenient to attend, I always find a pizza sponsor, because who doesn't love free pizza.&lt;br /&gt;
&amp;lt;\br&amp;gt;&lt;br /&gt;
I have been an active member of OWASP for many years and thoroughly enjoy planting seeds of interest with every attendee.&lt;br /&gt;
&amp;lt;\br&amp;gt;&lt;br /&gt;
Notably, I couldn't have done all of this without the help of my Penetration Testing team members, who are always willing to assist.  Our CTF team is &amp;quot;Savage Submarine,&amp;quot; and we're most proud of taking 1st place in the WebApp CmdNCntrl CTF at Defcon, in 2016. Other notable wins include 1st and 2nd place at the local CactusCon CTF, over the past few years.&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Fuentes.joaquin&amp;diff=231444</id>
		<title>User:Fuentes.joaquin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Fuentes.joaquin&amp;diff=231444"/>
				<updated>2017-07-07T17:59:35Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:Joaquin Fuentes.jpg|thumb|Joaquin Fuentes, OWASP Phoenix Chapter Leader]]&lt;br /&gt;
As the Phoenix Chapter Leader, I enjoy giving back to the community by bringing in speakers from around the valley and the U.S.  Web Application security is one of my passions, and I have held various professional security roles, from consulting to security architecture and managing a penetration testing team. With careful planning, our chapter has had the pleasure of previewing DefCon and Blackhat talks before the conferences, and have also brought in well known AppSec leaders/speakers present, such as Jim Manico.  We've also given back to the community by having special events such as Web Application Hacking Training with the OWASP Security Shephard Project, by hosting CTFs at local universities, and by tutoring high school students within a structured security tutoring program.&lt;br /&gt;
&lt;br /&gt;
Since reviving the OWASP Phoenix chapter, I've been able to grow interest to over 700+ meetup.com group members, and have on average 50-60+ attendees per chapter meeting.  To make meetings more convenient to attend, I always find a pizza sponsor, because who doesn't love free pizza.&lt;br /&gt;
&lt;br /&gt;
I have been an active member of OWASP for many years and thoroughly enjoy planting seeds of interest with every attendee.&lt;br /&gt;
&lt;br /&gt;
Notably, I couldn't have done all of this without the help of my Penetration Testing team members, who are always willing to assist.  Our CTF team is &amp;quot;Savage Submarine,&amp;quot; and we're most proud of taking 1st place in the WebApp CmdNCntrl CTF at Defcon, in 2016. Other notable wins include 1st and 2nd place at the local CactusCon CTF, over the past few years.&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Joaquin_Fuentes.jpg&amp;diff=231443</id>
		<title>File:Joaquin Fuentes.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Joaquin_Fuentes.jpg&amp;diff=231443"/>
				<updated>2017-07-07T17:59:11Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Joaquin Fuentes, Phoenix Chapter Leader&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Fuentes.joaquin&amp;diff=231442</id>
		<title>User:Fuentes.joaquin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Fuentes.joaquin&amp;diff=231442"/>
				<updated>2017-07-07T17:57:57Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: Updated the description&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;As the Phoenix Chapter Leader, I enjoy giving back to the community by bringing in speakers from around the valley and the U.S.  Web Application security is one of my passions, and I have held various professional security roles, from consulting to security architecture and managing a penetration testing team. With careful planning, our chapter has had the pleasure of previewing DefCon and Blackhat talks before the conferences, and have also brought in well known AppSec leaders/speakers present, such as Jim Manico.  We've also given back to the community by having special events such as Web Application Hacking Training with the OWASP Security Shephard Project, by hosting CTFs at local universities, and by tutoring high school students within a structured security tutoring program.&lt;br /&gt;
&lt;br /&gt;
Since reviving the OWASP Phoenix chapter, I've been able to grow interest to over 700+ meetup.com group members, and have on average 50-60+ attendees per chapter meeting.  To make meetings more convenient to attend, I always find a pizza sponsor, because who doesn't love free pizza.&lt;br /&gt;
&lt;br /&gt;
I have been an active member of OWASP for many years and thoroughly enjoy planting seeds of interest with every attendee.&lt;br /&gt;
&lt;br /&gt;
Notably, I couldn't have done all of this without the help of my Penetration Testing team members, who are always willing to assist.  Our CTF team is &amp;quot;Savage Submarine,&amp;quot; and we're most proud of taking 1st place in the WebApp CmdNCntrl CTF at Defcon, in 2016. Other notable wins include 1st and 2nd place at the local CactusCon CTF, over the past few years.&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231441</id>
		<title>WASPY Awards 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231441"/>
				<updated>2017-07-07T17:40:19Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* And the Nominees Are... */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY 2017 Banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Purpose of the Awards==&lt;br /&gt;
&lt;br /&gt;
Each year there are many individuals who do amazing work, dedicating countless hours to share, improve, and strengthen the OWASP mission. Some of these individuals are well known to the community while others are not. &lt;br /&gt;
&lt;br /&gt;
'''The purpose of these awards is to bring recognition to those who &amp;quot;FLY UNDER THE RADAR&amp;quot;. These are the individuals who are passionate about OWASP, who contribute hours of their own free time to the organization to help improve the cyber-security world, yet seem to go unrecognized.''' &lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
Call for Nominees Opens June 7, 2017  &lt;br /&gt;
&lt;br /&gt;
Call for Nominees Closes June 30, 2017 - CLOSED &lt;br /&gt;
&lt;br /&gt;
Announcement of Nominees per Category July 5, 2017 - DONE &lt;br /&gt;
&lt;br /&gt;
Deadline for Nominee Profile Picture and Bio to be created and added to the Nominees section July 10, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Opens July 17, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Closes July 24, 2017  &lt;br /&gt;
&lt;br /&gt;
Winners are Notified July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Announcement of Winners to the Community July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Award Ceremony at AppSecUSA 2017 in Orlando, FL September 21-22, 2017 &lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
The WASPYs celebrate the actors in our community who grow OWASP and drive innovation to the safety and security of the world’s software. This year we are excited to offer three categories.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Community Supporter''' - The WASPY for COMMUNITY honors members who create dynamic INTERACTION and LEARNING opportunities for the OWASP Community.  Nominees to the Community WASPY Award create collaborative and inclusive environments and grow the OWASP Community.  WASPYs focus on the unsung heros of the OWASP community.  Chapter Leaders and Community Members should especially consider leaders and volunteers who bring something extra to the environment, help the chapter reach out to new attendees, or carry out the tedious and repetitive tasks that make growing an OWASP Chapter possible.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Mission Outreach'''  - The WASPY for Mission Outreach honors community members who help the community GROW.  Growth can happen inside the larger OWASP community or outside it in the broader AppSec and development communities.   Leaders and Members should especially consider volunteers who pushed the boundaries of the audience and reach of OWASP to provide new exposure for OWASP’s projects and chapters.  New leaders and volunteers who help bring more people to your chapter, project, or actively represent OWASP at non-OWASP events, gatherings, and activities to build an active OWASP community are ideal candidates for the Mission Outreach WASPY award.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Innovator'''  - The WASPY for Innovation is given to a community member who has contributed to the TECHNICAL advancement of OWASP in the past year.  This advancement is usually through an [[:Category:OWASP Project|OWASP Project]] and can be in the form of code, an application, or anything that materially makes the AppSec community better in a unique way.  WASPYs focus on the unsung heros of the OWASP community who quietly go about making the world a bit better for their work.  Project Leaders and Community Members should especially consider nominating new projects, projects that have recently graduated, and project contributors for this WASPY.&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
'''Remember the purpose of these awards is to recognize the UNSUNG HEROS out there, that are barely recognized for their contributions to the OWASP Foundation.''' &lt;br /&gt;
&lt;br /&gt;
1. [https://www.owasp.org/index.php/About_OWASP#2015_Global_Board_Members Board members] may not be nominated &lt;br /&gt;
&lt;br /&gt;
2. [https://www.owasp.org/index.php/About_OWASP#Employees_and_Contractors_of_the_OWASP_Foundation Employees &amp;amp; Contractors] may not be nominated &lt;br /&gt;
&lt;br /&gt;
3. All nominees will remain anonymous until July 3, 2017&lt;br /&gt;
&lt;br /&gt;
4. Anyone can nominate an &amp;quot;unsung hero&amp;quot; who has contributed in some way to OWASP who they feel best fits each category &lt;br /&gt;
&lt;br /&gt;
5. You may only nominate one person per category &lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Name&lt;br /&gt;
! width=&amp;quot;800&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Category &amp;amp; Citation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |Aatral Arasu&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Sean has not only worked as a volunteer in the local chapter building community, his code projects are useful to the mission and his outreach efforts have included funding requests for OWASP Foundation to grow its mission. Sean is a great example of a community member.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Nicole Becher&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Nicole has been an amazing chapter leader. She brings knowledge and experience teaching cybersecurity to the Mentor Initiative, WIA Committee, and projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Ken Belva&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Ken is a long time chapter leader of the NYC chapter and a former chapter leader of the Brooklyn Chapter. Ken is always willing to step in and volunteer to help with OWASP initiatives and is a frequent participant in OWASP events as both a volunteer and speaker. Ken has spoken at AppSec USA on XSS techniques (&amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=G539NwvpL3I&amp;lt;/nowiki&amp;gt;) and is the project lead for the Basic Expression and Lexicon Variation Algorithms project (&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Basic_Expression_%26_Lexicon_Variation_Algorithms_(BELVA)_Project)&amp;lt;/nowiki&amp;gt;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tony has selflessly brought the OWASP dublin chapter to great nights. He has nurtured the chapter to be inclusive and open whilst growing the average attendee count to hundreds. He has spread the word across both security industry and developer industry and has also managed to get various organisations to work together such as ISACA, IISF, ISSA and ISC2. He is a great leader and despite detractors has built the chapter and awareness of software security issues in a strong vendor neutral manner to a great place. Tony is a great example of OWASP and industry leadership.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dinis Cruz&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Diniz is a fantastic innovator and motivator. As the mastermind and organizer behind the OWASP Summit he has managed to re-energize the OWASP community - many interesting projects would not have happened (or at least, not been that successful) without his passionate work. Besides organizing the event, he also consistently supported project leaders with his experience and ideas.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' Dinis put ridiculous effort (&amp;lt;nowiki&amp;gt;https://github.com/OWASP/owasp-summit-2017/commits?author=DinisCruz&amp;lt;/nowiki&amp;gt;) into the OWASP Summit 2017 and didn't tire promoting this event!&lt;br /&gt;
|-&lt;br /&gt;
|Christian Folini&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Christian Folini is very active in the Core Rule Set project community. He responds to a ton of questions submitted by newcomers when they are stuck and he answers expert level questions with stunning detail. He joined Chaim and Walter when they revived the project in 2016 and I heard he had the idea for the famous CRS3 release poster &amp;lt;nowiki&amp;gt;https://modsecurity.org/crs/poster&amp;lt;/nowiki&amp;gt; that was shared all over the net.  I think it's people like him that give OWASP a human face.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;In 2015, Joaquin took it upon himself to revive the OWASP Phoenix Chapter. He created a meet-up group to gain broader visibility. Since 2015, the meeting attendance has grown from an average of 15 attendees to over 60! Joaquin dedicates a lot of time and effort into scheduling an impressive variety of presentation topics including safe hacking, vulnerability scanner deep dives, hands on web exploitation CTF, video game hacking and more. I learn something new and cool at every event.&lt;br /&gt;
&lt;br /&gt;
More importantly, Joaquin works hard to foster a friendly, inclusive environment. During our hands-on web exploitation session, Joaquin recruited co-works to assist participants with the Security Shephard challenges so no one felt overwhelmed or impossibly stuck. He always takes the time meet and welcome new members. For example, my 17-year-old son attends meetings with me. He looks up to Joaquin as a mentor for a future information security career because Joaquin encourages his learning and offers career guidance.&lt;br /&gt;
&lt;br /&gt;
I highly recommend Joaquin for a WASPY award!! He is a kind, soft spoken person with a passion for sharing information security and helping others!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;He resurrected the Phoenix chapter and has kept it going with great content.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation:''' &amp;quot;Put simply, due to the efforts of Joaquin Fuentes, the Phoenix chapter has risen from the ashes (some pun intended). Before Joaquin took over the chapter there were consistently between 5-10 persons in attendance, Joaquin himself being one of them, and the chapter only met about every 3 months or so. Since Joaquin took over the chapter, we have had fantastic presenters each month, paid for dinners, along with a collaborative, comfortable, and engaging environment to meet in. Even more impressive the attendance has grown to 60+ consistently. Joaquin isn't even done yet! He is more great ideas and plans for the chapter that will undoubtedly contribute to the continued growth and over all quality of this once fallen chapter. When he speaks of where this chapter has come from and his plans for the future, it is undeniable to all that he does so with the passion that a leader must possess to accomplish that which Joaquin has.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''5th Citation:''' &amp;quot;I am sure someone else will write in with Joaquin's email, but I felt the need to second his name on the list. The events he puts together are top notch, have excellent speakers, always have things to eat, and are generally excellent. I almost never miss them. He is actually so gracious about the entire chapter that I am sure he does not get the credit he deserves... the whole show is put on by just him, I think. Yay Joaquin!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''6th Citation:''' &amp;quot;A few years ago, the Phoenix (AZ) OWASP group was basically defunct. As the leader of the Phoenix OWASP group, not only has Joaquin helped to resurrect the group, but we've had great presentations on reverse engineering, secure coding, a hands-on CTF contest with Security Shepherd, etc. Joaquin is a very visible member of the security community being an employee at Early Warning, which not only hosts the OWASP meetings, but also is a sponsor and makes a strong showing at CactusCon every year, the biggest security conference in Arizona.&lt;br /&gt;
&lt;br /&gt;
Our local OWASP group is not strong, going from being non-existent a few years ago to now getting a regular attendance of 40-80 people. I've gotten to know Joaquin through OWASP meetings and other security events in the area I have crossed paths with him, and he is a fine representative and evangelist for the OWASP organization.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''7th Citation:''' &amp;quot;Joaquin is the Phoenix OWASP Chapter leader and regularly plans amazing talks with great speakers for the Phoenix Community. Frequently, the Phoenix OWASP talks will have over 50 attendees which Joaquin manages without a problem! Joaquin also pushes for candidates he is interviewing to be familiar with OWASP before their interview.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''8th Citation:''' &amp;quot;Joaquin is the leader for the Phoenix OWASP, and it is clear that through his leadership the Phoenix OWASP thrives. Joaquin organizes all the meetings, and is constantly working with folks to create an excellent sense of community in the Phoenix area.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''9th Citation:''' &amp;quot;Joaquin has taken the Phoenix OWASP chapter that had not been managed for years and brought it back to life. We consistently see 50+ members coming to our Meetups to talk about AppSec related topics. Joaquin is well connected to the InfoSec groups and has had great success in pulling in new speakers, we have already had a few speakers who are prepping their BlackHat and DefCon talks by giving their presentations to our local chapter. Finally Joaquin does a great job by reaching out to the local colleges and supporting CTF activities to garner interest in pen-testing and the OWASP community. He is a true community supporter and fully deserves a WASPY for his efforts...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''10th Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''11th Citation:''' &amp;quot;As a leader of Phoenix OWASP chapter, Joaquin strives to organize talks and trainings to make people in the valley learn InfoSec and AppSec from experienced individuals. He has always gone a step ahead to conduct OWASP meetings that are informative and hands on. Right from giving Arizona State University (ASU) students an overview of basic InfoSec and career opportunities to organizing a hands on hacking workshop for people in the community, Joaquin has always demonstrated passion and determination to take Phoenix to a better place in the field of Cyber Security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''12th Citation:''' &amp;quot;I've attended and participated in three OWASP meetings lead by Joaquin. They are always well organized, offer a great learning experience and considerably contribute to the community. His continuous interest and dedication to the Phoenix chapter do not go unnoticed and are appreciated by all who attend.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''13th Citation:''' &amp;quot;Joaquin restarted the OWASP chapter in Phoenix/Scottsdale. Chapter meetings have grown significantly to where there were about 65 attendees at the most recent meeting with hundreds more on the mailing list (I was at the meeting, but I've only heard about the mailing list). As someone who works with him, I know how dedicated he is to the work of IT security and he's been able to attract top-notch speakers for OWASP meetings.'&lt;br /&gt;
&lt;br /&gt;
'''14th Citation:''' &amp;quot;Joaquin had successfully revived the Phoenix OWASP Chapter. Since, the chapter has excelled from zero to filled audience bringing security talent from all around to speak and educate to security professionals on the many facets of security domains.&lt;br /&gt;
&lt;br /&gt;
Additionally, this has provided a great forum to network with the many security professionals around the community and share their knowledge and strengthen the security community. &lt;br /&gt;
&lt;br /&gt;
Joaquin has provided his unselfish time as an OWASP Chapter leader, and has breathed new life into the Chapter.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''15th Citation:''' &amp;quot;Joaquin does a bang up job of running the Phoenix OWASP chapter. He does a great job of raising awareness and bringing folks from the infosec community into the fold.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''16th Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''17th Citation:''' No citation was submitted&lt;br /&gt;
|-&lt;br /&gt;
|Brendan Gormley&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Throughout the Brendan has not only assisted in making the dublin chapter events happen but taken a lead role. Brendan has organised venues and speakers for these events often going above and beyond to ensure success. Brendan has also been involved in some of the outreach programs the Dublin chapter had been involved in. No task is too big or too small for Brendan and without him I don't believe the Dublin chapter would be what it is.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tanya Janca&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Jeremy Long&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Jeremy is a dedicated security engineer who contributes to the community as a developer, mentor, contributor and leader. He's one of the smartest people I know - and one of the few who has patience with &amp;quot;the rest of us&amp;quot;. He is generous with his time and knowledge, helping not only to contribute apps and resources, but to build up the community itself.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Akash Mahajan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Akash has been backbone of OWASP bangalore chapter he has done lot of work for evangelizing OWASP. For more than 7 years now he has been working with the chapter and mentored lot of folks. No wonder he is called &amp;quot;the web app security guy&amp;quot;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Dhiraj Mishra - has been contributed and volunteered to, OWASP Mumbai Student chapter and Mumbai local chapter.&lt;br /&gt;
&lt;br /&gt;
He has endorse students to be part of multiple open community, however been an Sudent Chapter leader for OWASP he has discussed and shared multiple Information Security topics start from the scratch and spreading the idea's and awareness via chapter Meets, he has taken multiple session in NULL as well which runs with OWASP local chapter Mumbai, recently he invited Mozilla Club Mumbai to student chapter so that students can go to their area of interest, he always pushup/boost women in infosec. Apart from this he has taken various sessions in different colleges and have shared knowledge about Cyber Security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Denise Murtagh-Dunne&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Denise has been a hugely active member of the Dublin chapter and has been involved in all chapter meeting throughout the year and is ever keen to role up her sleeves and get stuck into work that others shy away from. This includes everything from setting up the meeting tools, organising venues, working with sponsors, getting speakers and assisting speakers in the run up and during events. She's been a very positively influence on the community and chapter and has encouraged other people to get involved. She's constantly updating and posting content on our social media accounts and making sure our members get relevant and interesting content. While in full time employment, Denise gives up family time to contribute to the chapter and ensure OWASP Dublin remains a vibrant and relevant group that engages the developer and security community locally.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Owen Pendlebury has been a key local OWASP volunteer over the last number of years. From being on the local Dublin chapter board to leading the Dublin chapter he regularly hosted and spoke at numerous collaborative and insightful security meetups.&lt;br /&gt;
&lt;br /&gt;
He has also been involved in organising AppSec EU in Rome and more recently co-organised the Belfast conference which was the biggest ever EU conference. As part of organising the conference in Belfast he negotiated that all chapters within Ireland would benefit financially getting a percentage of the conference profits to allow the chapters to bring bigger, better and more collaborative meetings to the Irish OWASP community and grow the communities across the country. &lt;br /&gt;
&lt;br /&gt;
I don’t know where he has found the time but has also been part of the Women in AppSec committee mentoring a number of individuals throughout the year. He took part in the Women in AppSec events in Belfast giving some insightful opinions into how improve attendees career. Owen is an asset that helps to improve Ireland's security community’s capabilities with a real can-do attitude.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mick Ryan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Mick always assists with chapter meetings and works to ensure we give the community good quality sessions. Mick assists will all areas including reaching out to potential speakers, getting info and bios from them, arranging dates and venues, posting on social media and the logistics of the meetings and ensuring speakers have the right cables, meetings run to time, that speakers are happy with everything, taking photos to promote the chapter on social media, encouraging people to speak, printing the chapter and getting people to events! Thanks Mick for your contribution in 2017!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;[https://www.owasp.org/index.php/Sriram Sriram] has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone. Sriram has been tremendously supporting the OWASP Chapter by giving trainings to various college student,  corporates and various chapters..&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Michelle Simpson&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Michelle has done an amazing job with the Belfast chapter and works tirelessly to improve the OWASP community and advocate strong app sec practices. This is very evident from the people attending the chapter events, organisations participating and the very successful AppSecEU conference that was held in Belfast in 2017. Michelle put a huge amount of work and effort into planning and preparation for AppSecEU to ensure the conference was of a high calibre. This was a sustained commitment over the majority of 2017 on top of local chapter commitments. I'd like to nominate Michelle for all the hard work and effort she puts into the chapter. Thanks Michelle!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Steve has been a tremendous supporter of the OWASP dependency-check project and leader on the related dependency-track platform. He is quick to respond to community question, answering with insightful and accurate responses assisting the community in their use of the dependency-check suite of tools.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/John_Vargas John Vargas]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;During the last 9 years John, together with a very small group of volunteers, has been making efforts to keep the chapter of Lima, Peru. Performing activities such as monthly meetings, internal trainings and participating actively in the OWASP Latam Tour. For the chapters in Latin America to keep afloat these activities with few resources is something very complicated and deserves recognition.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tara Williams&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Tara cares about integrity, inclusion and transparency, she is passionate about making OWASP a better place for all members of the community. With her talents in communications, she is getting the word out about OWASP's benefits to community members and attracting new members to chapter meetings, especially identifying successful pathways to transition meetup members to full members.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
'''&amp;quot;'''A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sean mentors, is a speaker, leads projects, is an active chapter leader and chapter Treasurer, participating in meetup events and a great representative at global, regional and external events.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tony has grown the chapter over the last year to a point where hundreds of people are attending meetings. The meetings are organised in advance now and have a theme. There were some really interesting people speaking at the chapter meetings including Simon Singh, James Lyne, Brian Honan and Jane Franklin. He has also engaged support from local companies with a lot more attending and sponsoring the chapter. There is a real buzz at chapter meetings and they're not just death by PowerPoint which they had been in the past.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;'''Christopher Frenz should be nominated for the Best Mission Outreach WASPY for his work as the Project Lead for the OWASP Anti-Ransomware Guide Project and the OWASP Secure Medical Device Deployment Standard Project. In the wake of WannaCry, anti-ransomware guidance has become more pertinent than ever and the project is regularly updated to keep abreast of the latest ransomware adaptations. Chris regularly shares his anti-ransomware knowledge with the security and healthcare communities and is an advocate for organizations conducting mock ransomware incidents. Chris has shared his knowledge of ransomware protections and of pertinent OWASP resources in numerous venues including articles (&amp;lt;nowiki&amp;gt;https://iapp.org/news/a/why-the-wannacry-outbreak-should-be-a-wake-up-call/&amp;lt;/nowiki&amp;gt;) and conference presentations at both the local and international level (&amp;lt;nowiki&amp;gt;https://iapp.org/conference/iapp-canada-privacy-symposium/sessions/?id=a191a000000zrqPAAQ&amp;lt;/nowiki&amp;gt;). A Spanish version of the guidance is also available. In addition, he has worked to call attention to the need for healthcare facilities to improve the security of their medical device implementations and is responsible for authoring version 1 of the OWASP Secure Medical Device Deployment Standard. The project has really worked to raise awareness of these issues and has been covered by CSO magazine (&amp;lt;nowiki&amp;gt;http://www.csoonline.com/article/3188230/security/how-to-securely-deploy-medical-devices.html&amp;lt;/nowiki&amp;gt;) and other news sources. Chris has given interviews on medical device security for the Cloud Security Alliance and others and will be speaking on medical device security at the Defcon BioHacking Village. Chris is always willing to share his knowledge with all who ask and is an active member of the NYC and Brooklyn OWASP chapters.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation''': &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation''': &amp;quot;My job takes me to many different OWASP Chapters, along with ISSA, CSA, ISACA, etc.&lt;br /&gt;
The Phoenix OWASP Chapter was DEAD before Joaquin volunteered to lead the Chapter a few years ago.&lt;br /&gt;
It is now consistently one of the BEST ITSec community gatherings, and I go out of my way to be in Phoenix for their meetings.&lt;br /&gt;
To put it a different way, at my first Phoenix OWASP meeting there were less than 12 attendees, including myself and the speaker. Last week it was standing room only (75+) *and* there would have been more if Interstate 17 hadn't been closed in both directions at the start of rush-hour.&lt;br /&gt;
Part of the reason Joaquin deserves this award is that he is EXTREMELY knowledgeable about AppSec and many other aspects of data security and he is ALWAYS friendly and willing to share. His day-job is no picnic, but he finds the time to put together great meetings and do it in a way that everybody has a good time.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tanya Janca&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tanya has been instrumental in outreach in the Ottawa Ontario Canada region building membership and participation in the local OWASP chapter, as well as building bridges with other local organizations (Python user group, Ruby Rails user group, WIA, etc.). Tanya has also been a driver in getting a mentoring program setup via the Ottawa chapter. She has also encouraged participation in local CTF events, presented at local conferences (BSides, etc). Tanya's enthusiasm, support, and interaction is often contagious (in a good way :) ). Lastly, Tanya is a strong advocate or evangelist for OWASP projects, promoting such as appropriate per audience/presentation (including, but not limited to: ZAP, Top 10, SKF).&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Tanya Janca is an excellent ambassador for OWASP. Since her entry into the lead team of the OWASP Ottawa chapter, she has doubled the size of the chapter and developed the chapter into a meeting place for dozens of women interested in Application Security.&lt;br /&gt;
Tanya Janca is an energetic speaker who held a fantastic presentation at AppSecEU in Belfast. &amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=mPTmuaC2lOI&amp;lt;/nowiki&amp;gt; She was subsequently invited to the Swiss Cyberstorm Conference where her addition to the rooster was explained in an admiring blogpost &amp;lt;nowiki&amp;gt;https://swisscyberstorm.com/2017/05/23/Introducing_Tany_Janca.html&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Tanya Janca has the ability to talk security to techies and management alike. She is pushing for the adoption of OWASP practices and project by the government of Canada her employer. Having received the Government of Canada’s CIO Award for “Excellent in Security” in 2016 she refused to move into the private sector, but continues to support the security community inside the public sector, where her excellent know-how is very important.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Kitisak Jirawannakool&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Web security is notoriously bad in Thailand, so an actives security community is sorely needed. Kitisak is a central figure in that community. He has worked on establishing the OWASP Bangkok chapter for the past six years, organizing meetups, community outreach and engaging with security experts internationally. His work has played a pivotal role in creating IT security awareness in the fast-growing South-East-Asian country.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|James Manico&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Jim's influence on OWASP materials (and therefore on application security) is amazing - he's cited on nearly every cheat sheet on OWASP Top 10 document. His name is synonymous with application security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation: &amp;quot;'''While Jim may not be the &amp;quot;unsung hero&amp;quot; - he is the first and foremost cheerleader/champion of OWASP. His efforts and contributions are innumerable. As anyone who knows Jim - he is not a reserved individual when touting the resources available via OWASP. He has likely done more then anyone else working with OWASP to bring together, motivate, and get individuals to contribute to OWASP. From the immensely popular checklists to motivating individuals to contribute. OWASP would not be nearly as successful as it has been without Jim.&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|Mateo Martinez&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Mateo is one of the leaders in Latin America more recognized, during the last years his efforts to join the chapters chapter along with other leaders of Latam made that the community grew and that today the Latam Tour 2017 has more than 15 participating countries. He also managed to spread the spirit of owasp and help establish new chapters in the region.&lt;br /&gt;
The effort to maintain more communication between OWASP GLobal and local communities is reflected in each activity that encourages other leaders to ensure that they strive every day to spread Owasp projects and to grow the community.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Miller&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The OWASP Podcast is a effort that is in line with the mission of OWASP raising visability for software security. This is a VERY powerful voice in the community globally and Mark Miller should be applauded for his efforts on this&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Podcast&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj was nominated for WASPY 2016, his contribution to the community is from past one 'n half year in various areas, start from the projects, local volunteering and what not, he was also listed in OWASP Hall Of Fame.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Owen is an active participator in OWASP meetings and has been a great inspiration to me.&lt;br /&gt;
He has shown himself to be a great leader and OWASP advocate.&lt;br /&gt;
Owen has recommended other AppSec communities in which I have become involved in since moving to Dublin. He is an evangelist for women in technology and I have witnessed this first hand.&lt;br /&gt;
I don't hesitate to recommend Owen for this award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Owen has introduced me to the OWASP Community in Ireland and EU. Help me to get involve with Women in AppSec and participate in the AppSec EU event in Belfast. He is a great leader, who enjoys talking about OWASP and the great community behind it.&lt;br /&gt;
I've moved to Ireland a couple of months ago, and getting to know Owen and the OWASP community has completely changed my life, both professionally and personally. &lt;br /&gt;
So, yes, I would like to nominate Owen Pendlebury because he the proof that Women in AppSec is not just a women matter. :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram Shyam]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sriram has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Noreen Whysell&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Noreen is helping each day to improve OWASP members' experiences bringing her expertise and knowledge as a mentor and projects as a Chapter Leader, one member at a time. She understands what members want, how to improve member benefits and is applying that knowledge to improving local and global member experiences from the ground up. Her efforts are multiplied by her sharing of knowledge and grassroots approach creating a membership groundswell.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Sean leads the BLT Project and is a Team Leader for the Learning Gateway project. He has helped improve the quality of web experiences, including OWASP.org .&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Glenn &amp;amp; Riccardo ten Cate&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;I am hereby nominating the brothers Glenn &amp;amp; Riccardo ten Cate from the Netherlands for the WASPY award in this category. They are known for their work on the open-source project SKF (Security Knowledge Framework). These are two guys who are dedicated to spreading security knowledge trough the means OWASP has to offer. You might have encountered them talking at seminars, promoting their project and OWASP, or different companies where they teach development teams how to integrate the OWASP core principles in their workflow using their project. Not only professional development teams but also students of security can only be amazed at the sheer knowledge they gathered and contribute to the global OWASP community trough open source. The sheer effort they put in this project teaches, guides, structures and shows by example how to test and write secure applications by design. There is no other software out there that does this. And that is why they deserve this nomination for best innovator 2017.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Deenihan&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Mark for his constant devotion and work on the OWASP security shepherd project and continuing to develop it and teach people globally about app sec.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Seba Deleersnyder&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;One of the main projects to date is SAMM. Seba with the support of project colliders has made this a flagship project of OWASP. The level of maturity and the number of improvements obtained indicates that this project is one of the most mature and a great projection to the future.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Chris' projects are opening doors for OWASP in the standards development and getting the word out about important IoT with his Medical Device Deployment Standard: &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Secure_Medical_Device_Deployment_Standard&amp;lt;/nowiki&amp;gt; which already has a Turkish translation and attracted attention from the Turkish public health department. He has delivered presentations at meetups, and presenting to the IDESG, www.idesg.org in July. He has a &amp;quot;soup label&amp;quot; tool that gives simple guidance for the implementation of the OSMDDS. This is not Chris' first project but it is surely one of the best OWASP innovations of the year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Brianglas Brian Glas]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Brian has been paramount in 2 very strategic initiatives for OWASP. He is not only a Project Leader for the OWASP SAMM project but he has been instrumental in revamping the call for data and reorganizing the flagship OWASP Top Ten. Brian continues to support and speak about the benefits of supporting OWASP especially projects and participating in the Summit. Please consider Brian Glas as the Best Community Supporter for this year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Evin Hernandez&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Evins focus on the core of the information security platform with Virtual Village has provided the global community with a place to experiment and leverage for testing... &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Virtual_Village_Project&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Jeremy Long&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Considering how often projects have a great start and plateau, we should recognize the ongoing effort and dedication given to one of the Flagship projects in our community.&lt;br /&gt;
Jeremy Long has continued to not only maintain the Dependency Check project but develop and improve it each year.&lt;br /&gt;
This year he added Improvements in the core dependency-check platform in terms of code quality, achieved 100% for the CII Best Practices for dependency-check, continued to develop the ODC community with several contributors submitting PRs, and over the last several months he's been working on platform maturity and will be releasing 2.0.0 in the first half of July 2017.&lt;br /&gt;
After 2.0 is released he has planned work on Python support and expanding the tool by integrating additional data-sources such as Artifactory, Redhat Victim's, OSS-Index, etc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Jeremy has been an avid contributor/leader for the OWASP dependency-check project. Under his leadership the project has garnered substantial community support in terms of pull requests, improved code quality via Sonarcloud, Coverity, Codacy, and CII Best Practices. While the last six months have been primarily around code quality and bug fixes; these improvements are setting the dependency-check project up for major enhancements over the coming months!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Daniel Miessler&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Daniel seems to be everywhere at once - despite have a full-time job, he is leading or co-leading several OWASP projects, has created ideas for groups out of thin air, and has performed work in much needed areas.&lt;br /&gt;
This year, Daniel has lead or co-lead the Internet of Things security project, completed an IoT: Medical Devices attack surface overview, and created the Game Security project.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj is one of the top contributor in OWASP Cheat Sheet Project, which have security guidance in an easy read format, his contribution for SQL Injection WAF Bypass and XSS Evasion - OWASP, was mostly recommended and used by Cyber Security professional, dhiraj has contributed to Benchmark project by contributing SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring and many such projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Bernhard Mueller&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;During the last 18 months Bernhard has been spearheading the OWASP Mobile Testing Guide Project. He has invested several man-months of writing, editing, reviewing, rallying authors, and pushing the project into new directions. This also resulted in the novel agile book writing process and book production pipeline which enables OWASP to produce a professional tech book. The project has produced a security standard and early-release ebook, and is on track become one of OWASP's main flagship projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Steve's work on dependency-track is fantastic - he's moved forward to address the next round of issues, with an innovative solution all companies can leverage.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|thc202&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Simon Bennets &amp;quot;wingman&amp;quot; in the ZAP project, by now even the top committer in the project! (&amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/graphs/contributors&amp;lt;/nowiki&amp;gt;) So &amp;quot;unsung of&amp;quot; that I do not even know his real name!&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Coming July 25, 2017&lt;br /&gt;
&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!&lt;br /&gt;
&lt;br /&gt;
Sponsorships coming soon!&lt;br /&gt;
&lt;br /&gt;
==Communication==&lt;br /&gt;
# June 7, 2017 Email to the Leaders &amp;amp; Community list. Posted to the OWASP [https://owasp.blogspot.com/2017/06/nominations-are-now-being-accepted-for.html Blog]&lt;br /&gt;
# June 30, 2017 Email to the Leaders &amp;amp; Community list.&lt;br /&gt;
# July 5, 2017 Email to the Nominees&lt;br /&gt;
# July 5, 2017 Email to the Leaders &amp;amp; Community list, and Blog post announcing the nominees have been announced.&lt;br /&gt;
&lt;br /&gt;
=='''Past WASPY Awards'''==&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2016 2016]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2015 2015] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2014 2014] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2013 2013] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2012 2012] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231440</id>
		<title>WASPY Awards 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231440"/>
				<updated>2017-07-07T17:39:20Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* And the Nominees Are... */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY 2017 Banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Purpose of the Awards==&lt;br /&gt;
&lt;br /&gt;
Each year there are many individuals who do amazing work, dedicating countless hours to share, improve, and strengthen the OWASP mission. Some of these individuals are well known to the community while others are not. &lt;br /&gt;
&lt;br /&gt;
'''The purpose of these awards is to bring recognition to those who &amp;quot;FLY UNDER THE RADAR&amp;quot;. These are the individuals who are passionate about OWASP, who contribute hours of their own free time to the organization to help improve the cyber-security world, yet seem to go unrecognized.''' &lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
Call for Nominees Opens June 7, 2017  &lt;br /&gt;
&lt;br /&gt;
Call for Nominees Closes June 30, 2017 - CLOSED &lt;br /&gt;
&lt;br /&gt;
Announcement of Nominees per Category July 5, 2017 - DONE &lt;br /&gt;
&lt;br /&gt;
Deadline for Nominee Profile Picture and Bio to be created and added to the Nominees section July 10, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Opens July 17, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Closes July 24, 2017  &lt;br /&gt;
&lt;br /&gt;
Winners are Notified July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Announcement of Winners to the Community July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Award Ceremony at AppSecUSA 2017 in Orlando, FL September 21-22, 2017 &lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
The WASPYs celebrate the actors in our community who grow OWASP and drive innovation to the safety and security of the world’s software. This year we are excited to offer three categories.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Community Supporter''' - The WASPY for COMMUNITY honors members who create dynamic INTERACTION and LEARNING opportunities for the OWASP Community.  Nominees to the Community WASPY Award create collaborative and inclusive environments and grow the OWASP Community.  WASPYs focus on the unsung heros of the OWASP community.  Chapter Leaders and Community Members should especially consider leaders and volunteers who bring something extra to the environment, help the chapter reach out to new attendees, or carry out the tedious and repetitive tasks that make growing an OWASP Chapter possible.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Mission Outreach'''  - The WASPY for Mission Outreach honors community members who help the community GROW.  Growth can happen inside the larger OWASP community or outside it in the broader AppSec and development communities.   Leaders and Members should especially consider volunteers who pushed the boundaries of the audience and reach of OWASP to provide new exposure for OWASP’s projects and chapters.  New leaders and volunteers who help bring more people to your chapter, project, or actively represent OWASP at non-OWASP events, gatherings, and activities to build an active OWASP community are ideal candidates for the Mission Outreach WASPY award.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Innovator'''  - The WASPY for Innovation is given to a community member who has contributed to the TECHNICAL advancement of OWASP in the past year.  This advancement is usually through an [[:Category:OWASP Project|OWASP Project]] and can be in the form of code, an application, or anything that materially makes the AppSec community better in a unique way.  WASPYs focus on the unsung heros of the OWASP community who quietly go about making the world a bit better for their work.  Project Leaders and Community Members should especially consider nominating new projects, projects that have recently graduated, and project contributors for this WASPY.&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
'''Remember the purpose of these awards is to recognize the UNSUNG HEROS out there, that are barely recognized for their contributions to the OWASP Foundation.''' &lt;br /&gt;
&lt;br /&gt;
1. [https://www.owasp.org/index.php/About_OWASP#2015_Global_Board_Members Board members] may not be nominated &lt;br /&gt;
&lt;br /&gt;
2. [https://www.owasp.org/index.php/About_OWASP#Employees_and_Contractors_of_the_OWASP_Foundation Employees &amp;amp; Contractors] may not be nominated &lt;br /&gt;
&lt;br /&gt;
3. All nominees will remain anonymous until July 3, 2017&lt;br /&gt;
&lt;br /&gt;
4. Anyone can nominate an &amp;quot;unsung hero&amp;quot; who has contributed in some way to OWASP who they feel best fits each category &lt;br /&gt;
&lt;br /&gt;
5. You may only nominate one person per category &lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Name&lt;br /&gt;
! width=&amp;quot;800&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Category &amp;amp; Citation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |Aatral Arasu&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Sean has not only worked as a volunteer in the local chapter building community, his code projects are useful to the mission and his outreach efforts have included funding requests for OWASP Foundation to grow its mission. Sean is a great example of a community member.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Nicole Becher&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Nicole has been an amazing chapter leader. She brings knowledge and experience teaching cybersecurity to the Mentor Initiative, WIA Committee, and projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Ken Belva&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Ken is a long time chapter leader of the NYC chapter and a former chapter leader of the Brooklyn Chapter. Ken is always willing to step in and volunteer to help with OWASP initiatives and is a frequent participant in OWASP events as both a volunteer and speaker. Ken has spoken at AppSec USA on XSS techniques (&amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=G539NwvpL3I&amp;lt;/nowiki&amp;gt;) and is the project lead for the Basic Expression and Lexicon Variation Algorithms project (&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Basic_Expression_%26_Lexicon_Variation_Algorithms_(BELVA)_Project)&amp;lt;/nowiki&amp;gt;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tony has selflessly brought the OWASP dublin chapter to great nights. He has nurtured the chapter to be inclusive and open whilst growing the average attendee count to hundreds. He has spread the word across both security industry and developer industry and has also managed to get various organisations to work together such as ISACA, IISF, ISSA and ISC2. He is a great leader and despite detractors has built the chapter and awareness of software security issues in a strong vendor neutral manner to a great place. Tony is a great example of OWASP and industry leadership.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dinis Cruz&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Diniz is a fantastic innovator and motivator. As the mastermind and organizer behind the OWASP Summit he has managed to re-energize the OWASP community - many interesting projects would not have happened (or at least, not been that successful) without his passionate work. Besides organizing the event, he also consistently supported project leaders with his experience and ideas.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' Dinis put ridiculous effort (&amp;lt;nowiki&amp;gt;https://github.com/OWASP/owasp-summit-2017/commits?author=DinisCruz&amp;lt;/nowiki&amp;gt;) into the OWASP Summit 2017 and didn't tire promoting this event!&lt;br /&gt;
|-&lt;br /&gt;
|Christian Folini&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Christian Folini is very active in the Core Rule Set project community. He responds to a ton of questions submitted by newcomers when they are stuck and he answers expert level questions with stunning detail. He joined Chaim and Walter when they revived the project in 2016 and I heard he had the idea for the famous CRS3 release poster &amp;lt;nowiki&amp;gt;https://modsecurity.org/crs/poster&amp;lt;/nowiki&amp;gt; that was shared all over the net.  I think it's people like him that give OWASP a human face.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;In 2015, Joaquin took it upon himself to revive the OWASP Phoenix Chapter. He created a meet-up group to gain broader visibility. Since 2015, the meeting attendance has grown from an average of 15 attendees to over 60! Joaquin dedicates a lot of time and effort into scheduling an impressive variety of presentation topics including safe hacking, vulnerability scanner deep dives, hands on web exploitation CTF, video game hacking and more. I learn something new and cool at every event.&lt;br /&gt;
&lt;br /&gt;
More importantly, Joaquin works hard to foster a friendly, inclusive environment. During our hands-on web exploitation session, Joaquin recruited co-works to assist participants with the Security Shephard challenges so no one felt overwhelmed or impossibly stuck. He always takes the time meet and welcome new members. For example, my 17-year-old son attends meetings with me. He looks up to Joaquin as a mentor for a future information security career because Joaquin encourages his learning and offers career guidance.&lt;br /&gt;
&lt;br /&gt;
I highly recommend Joaquin for a WASPY award!! He is a kind, soft spoken person with a passion for sharing information security and helping others!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;He resurrected the Phoenix chapter and has kept it going with great content.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation:''' &amp;quot;Put simply, due to the efforts of Joaquin Fuentes, the Phoenix chapter has risen from the ashes (some pun intended). Before Joaquin took over the chapter there were consistently between 5-10 persons in attendance, Joaquin himself being one of them, and the chapter only met about every 3 months or so. Since Joaquin took over the chapter, we have had fantastic presenters each month, paid for dinners, along with a collaborative, comfortable, and engaging environment to meet in. Even more impressive the attendance has grown to 60+ consistently. Joaquin isn't even done yet! He is more great ideas and plans for the chapter that will undoubtedly contribute to the continued growth and over all quality of this once fallen chapter. When he speaks of where this chapter has come from and his plans for the future, it is undeniable to all that he does so with the passion that a leader must possess to accomplish that which Joaquin has.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''5th Citation:''' &amp;quot;I am sure someone else will write in with Joaquin's email, but I felt the need to second his name on the list. The events he puts together are top notch, have excellent speakers, always have things to eat, and are generally excellent. I almost never miss them. He is actually so gracious about the entire chapter that I am sure he does not get the credit he deserves... the whole show is put on by just him, I think. Yay Joaquin!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''6th Citation:''' &amp;quot;A few years ago, the Phoenix (AZ) OWASP group was basically defunct. As the leader of the Phoenix OWASP group, not only has Joaquin helped to resurrect the group, but we've had great presentations on reverse engineering, secure coding, a hands-on CTF contest with Security Shepherd, etc. Joaquin is a very visible member of the security community being an employee at Early Warning, which not only hosts the OWASP meetings, but also is a sponsor and makes a strong showing at CactusCon every year, the biggest security conference in Arizona.&lt;br /&gt;
&lt;br /&gt;
Our local OWASP group is not strong, going from being non-existent a few years ago to now getting a regular attendance of 40-80 people. I've gotten to know Joaquin through OWASP meetings and other security events in the area I have crossed paths with him, and he is a fine representative and evangelist for the OWASP organization.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''7th Citation:''' &amp;quot;Joaquin is the Phoenix OWASP Chapter leader and regularly plans amazing talks with great speakers for the Phoenix Community. Frequently, the Phoenix OWASP talks will have over 50 attendees which Joaquin manages without a problem! Joaquin also pushes for candidates he is interviewing to be familiar with OWASP before their interview.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''8th Citation:''' &amp;quot;Joaquin is the leader for the Phoenix OWASP, and it is clear that through his leadership the Phoenix OWASP thrives. Joaquin organizes all the meetings, and is constantly working with folks to create an excellent sense of community in the Phoenix area.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''9th Citation:''' &amp;quot;Joaquin has taken the Phoenix OWASP chapter that had not been managed for years and brought it back to life. We consistently see 50+ members coming to our Meetups to talk about AppSec related topics. Joaquin is well connected to the InfoSec groups and has had great success in pulling in new speakers, we have already had a few speakers who are prepping their BlackHat and DefCon talks by giving their presentations to our local chapter. Finally Joaquin does a great job by reaching out to the local colleges and supporting CTF activities to garner interest in pen-testing and the OWASP community. He is a true community supporter and fully deserves a WASPY for his efforts...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''10th Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''11th Citation:''' &amp;quot;As a leader of Phoenix OWASP chapter, Joaquin strives to organize talks and trainings to make people in the valley learn InfoSec and AppSec from experienced individuals. He has always gone a step ahead to conduct OWASP meetings that are informative and hands on. Right from giving Arizona State University (ASU) students an overview of basic InfoSec and career opportunities to organizing a hands on hacking workshop for people in the community, Joaquin has always demonstrated passion and determination to take Phoenix to a better place in the field of Cyber Security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''12th Citation:''' &amp;quot;I've attended and participated in three OWASP meetings lead by Joaquin. They are always well organized, offer a great learning experience and considerably contribute to the community. His continuous interest and dedication to the Phoenix chapter do not go unnoticed and are appreciated by all who attend.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''13th Citation:''' &amp;quot;Joaquin restarted the OWASP chapter in Phoenix/Scottsdale. Chapter meetings have grown significantly to where there were about 65 attendees at the most recent meeting with hundreds more on the mailing list (I was at the meeting, but I've only heard about the mailing list). As someone who works with him, I know how dedicated he is to the work of IT security and he's been able to attract top-notch speakers for OWASP meetings.'&lt;br /&gt;
&lt;br /&gt;
'''14th Citation:''' &amp;quot;Joaquin had successfully revived the Phoenix OWASP Chapter. Since, the chapter has excelled from zero to filled audience bringing security talent from all around to speak and educate to security professionals on the many facets of security domains.&lt;br /&gt;
&lt;br /&gt;
Additionally, this has provided a great forum to network with the many security professionals around the community and share their knowledge and strengthen the security community. &lt;br /&gt;
&lt;br /&gt;
Joaquin has provided his unselfish time as an OWASP Chapter leader, and has breathed new life into the Chapter.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''15th Citation:''' &amp;quot;Joaquin does a bang up job of running the Phoenix OWASP chapter. He does a great job of raising awareness and bringing folks from the infosec community into the fold.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''16th Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''17th Citation:''' No citation was submitted&lt;br /&gt;
|-&lt;br /&gt;
|Brendan Gormley&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Throughout the Brendan has not only assisted in making the dublin chapter events happen but taken a lead role. Brendan has organised venues and speakers for these events often going above and beyond to ensure success. Brendan has also been involved in some of the outreach programs the Dublin chapter had been involved in. No task is too big or too small for Brendan and without him I don't believe the Dublin chapter would be what it is.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tanya Janca&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Jeremy Long&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Jeremy is a dedicated security engineer who contributes to the community as a developer, mentor, contributor and leader. He's one of the smartest people I know - and one of the few who has patience with &amp;quot;the rest of us&amp;quot;. He is generous with his time and knowledge, helping not only to contribute apps and resources, but to build up the community itself.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Akash Mahajan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Akash has been backbone of OWASP bangalore chapter he has done lot of work for evangelizing OWASP. For more than 7 years now he has been working with the chapter and mentored lot of folks. No wonder he is called &amp;quot;the web app security guy&amp;quot;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Dhiraj Mishra - has been contributed and volunteered to, OWASP Mumbai Student chapter and Mumbai local chapter.&lt;br /&gt;
&lt;br /&gt;
He has endorse students to be part of multiple open community, however been an Sudent Chapter leader for OWASP he has discussed and shared multiple Information Security topics start from the scratch and spreading the idea's and awareness via chapter Meets, he has taken multiple session in NULL as well which runs with OWASP local chapter Mumbai, recently he invited Mozilla Club Mumbai to student chapter so that students can go to their area of interest, he always pushup/boost women in infosec. Apart from this he has taken various sessions in different colleges and have shared knowledge about Cyber Security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Denise Murtagh-Dunne&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Denise has been a hugely active member of the Dublin chapter and has been involved in all chapter meeting throughout the year and is ever keen to role up her sleeves and get stuck into work that others shy away from. This includes everything from setting up the meeting tools, organising venues, working with sponsors, getting speakers and assisting speakers in the run up and during events. She's been a very positively influence on the community and chapter and has encouraged other people to get involved. She's constantly updating and posting content on our social media accounts and making sure our members get relevant and interesting content. While in full time employment, Denise gives up family time to contribute to the chapter and ensure OWASP Dublin remains a vibrant and relevant group that engages the developer and security community locally.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Owen Pendlebury has been a key local OWASP volunteer over the last number of years. From being on the local Dublin chapter board to leading the Dublin chapter he regularly hosted and spoke at numerous collaborative and insightful security meetups.&lt;br /&gt;
&lt;br /&gt;
He has also been involved in organising AppSec EU in Rome and more recently co-organised the Belfast conference which was the biggest ever EU conference. As part of organising the conference in Belfast he negotiated that all chapters within Ireland would benefit financially getting a percentage of the conference profits to allow the chapters to bring bigger, better and more collaborative meetings to the Irish OWASP community and grow the communities across the country. &lt;br /&gt;
&lt;br /&gt;
I don’t know where he has found the time but has also been part of the Women in AppSec committee mentoring a number of individuals throughout the year. He took part in the Women in AppSec events in Belfast giving some insightful opinions into how improve attendees career. Owen is an asset that helps to improve Ireland's security community’s capabilities with a real can-do attitude.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mick Ryan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Mick always assists with chapter meetings and works to ensure we give the community good quality sessions. Mick assists will all areas including reaching out to potential speakers, getting info and bios from them, arranging dates and venues, posting on social media and the logistics of the meetings and ensuring speakers have the right cables, meetings run to time, that speakers are happy with everything, taking photos to promote the chapter on social media, encouraging people to speak, printing the chapter and getting people to events! Thanks Mick for your contribution in 2017!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;[https://www.owasp.org/index.php/Sriram Sriram] has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone. Sriram has been tremendously supporting the OWASP Chapter by giving trainings to various college student,  corporates and various chapters..&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Michelle Simpson&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Michelle has done an amazing job with the Belfast chapter and works tirelessly to improve the OWASP community and advocate strong app sec practices. This is very evident from the people attending the chapter events, organisations participating and the very successful AppSecEU conference that was held in Belfast in 2017. Michelle put a huge amount of work and effort into planning and preparation for AppSecEU to ensure the conference was of a high calibre. This was a sustained commitment over the majority of 2017 on top of local chapter commitments. I'd like to nominate Michelle for all the hard work and effort she puts into the chapter. Thanks Michelle!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Steve has been a tremendous supporter of the OWASP dependency-check project and leader on the related dependency-track platform. He is quick to respond to community question, answering with insightful and accurate responses assisting the community in their use of the dependency-check suite of tools.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/John_Vargas John Vargas]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;During the last 9 years John, together with a very small group of volunteers, has been making efforts to keep the chapter of Lima, Peru. Performing activities such as monthly meetings, internal trainings and participating actively in the OWASP Latam Tour. For the chapters in Latin America to keep afloat these activities with few resources is something very complicated and deserves recognition.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tara Williams&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Tara cares about integrity, inclusion and transparency, she is passionate about making OWASP a better place for all members of the community. With her talents in communications, she is getting the word out about OWASP's benefits to community members and attracting new members to chapter meetings, especially identifying successful pathways to transition meetup members to full members.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
'''&amp;quot;'''A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sean mentors, is a speaker, leads projects, is an active chapter leader and chapter Treasurer, participating in meetup events and a great representative at global, regional and external events.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tony has grown the chapter over the last year to a point where hundreds of people are attending meetings. The meetings are organised in advance now and have a theme. There were some really interesting people speaking at the chapter meetings including Simon Singh, James Lyne, Brian Honan and Jane Franklin. He has also engaged support from local companies with a lot more attending and sponsoring the chapter. There is a real buzz at chapter meetings and they're not just death by PowerPoint which they had been in the past.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;'''Christopher Frenz should be nominated for the Best Mission Outreach WASPY for his work as the Project Lead for the OWASP Anti-Ransomware Guide Project and the OWASP Secure Medical Device Deployment Standard Project. In the wake of WannaCry, anti-ransomware guidance has become more pertinent than ever and the project is regularly updated to keep abreast of the latest ransomware adaptations. Chris regularly shares his anti-ransomware knowledge with the security and healthcare communities and is an advocate for organizations conducting mock ransomware incidents. Chris has shared his knowledge of ransomware protections and of pertinent OWASP resources in numerous venues including articles (&amp;lt;nowiki&amp;gt;https://iapp.org/news/a/why-the-wannacry-outbreak-should-be-a-wake-up-call/&amp;lt;/nowiki&amp;gt;) and conference presentations at both the local and international level (&amp;lt;nowiki&amp;gt;https://iapp.org/conference/iapp-canada-privacy-symposium/sessions/?id=a191a000000zrqPAAQ&amp;lt;/nowiki&amp;gt;). A Spanish version of the guidance is also available. In addition, he has worked to call attention to the need for healthcare facilities to improve the security of their medical device implementations and is responsible for authoring version 1 of the OWASP Secure Medical Device Deployment Standard. The project has really worked to raise awareness of these issues and has been covered by CSO magazine (&amp;lt;nowiki&amp;gt;http://www.csoonline.com/article/3188230/security/how-to-securely-deploy-medical-devices.html&amp;lt;/nowiki&amp;gt;) and other news sources. Chris has given interviews on medical device security for the Cloud Security Alliance and others and will be speaking on medical device security at the Defcon BioHacking Village. Chris is always willing to share his knowledge with all who ask and is an active member of the NYC and Brooklyn OWASP chapters.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Joaquin Fuentes&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation''': &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation''': &amp;quot;My job takes me to many different OWASP Chapters, along with ISSA, CSA, ISACA, etc.&lt;br /&gt;
The Phoenix OWASP Chapter was DEAD before Joaquin volunteered to lead the Chapter a few years ago.&lt;br /&gt;
It is now consistently one of the BEST ITSec community gatherings, and I go out of my way to be in Phoenix for their meetings.&lt;br /&gt;
To put it a different way, at my first Phoenix OWASP meeting there were less than 12 attendees, including myself and the speaker. Last week it was standing room only (75+) *and* there would have been more if Interstate 17 hadn't been closed in both directions at the start of rush-hour.&lt;br /&gt;
Part of the reason Joaquin deserves this award is that he is EXTREMELY knowledgeable about AppSec and many other aspects of data security and he is ALWAYS friendly and willing to share. His day-job is no picnic, but he finds the time to put together great meetings and do it in a way that everybody has a good time.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tanya Janca&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tanya has been instrumental in outreach in the Ottawa Ontario Canada region building membership and participation in the local OWASP chapter, as well as building bridges with other local organizations (Python user group, Ruby Rails user group, WIA, etc.). Tanya has also been a driver in getting a mentoring program setup via the Ottawa chapter. She has also encouraged participation in local CTF events, presented at local conferences (BSides, etc). Tanya's enthusiasm, support, and interaction is often contagious (in a good way :) ). Lastly, Tanya is a strong advocate or evangelist for OWASP projects, promoting such as appropriate per audience/presentation (including, but not limited to: ZAP, Top 10, SKF).&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Tanya Janca is an excellent ambassador for OWASP. Since her entry into the lead team of the OWASP Ottawa chapter, she has doubled the size of the chapter and developed the chapter into a meeting place for dozens of women interested in Application Security.&lt;br /&gt;
Tanya Janca is an energetic speaker who held a fantastic presentation at AppSecEU in Belfast. &amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=mPTmuaC2lOI&amp;lt;/nowiki&amp;gt; She was subsequently invited to the Swiss Cyberstorm Conference where her addition to the rooster was explained in an admiring blogpost &amp;lt;nowiki&amp;gt;https://swisscyberstorm.com/2017/05/23/Introducing_Tany_Janca.html&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Tanya Janca has the ability to talk security to techies and management alike. She is pushing for the adoption of OWASP practices and project by the government of Canada her employer. Having received the Government of Canada’s CIO Award for “Excellent in Security” in 2016 she refused to move into the private sector, but continues to support the security community inside the public sector, where her excellent know-how is very important.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Kitisak Jirawannakool&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Web security is notoriously bad in Thailand, so an actives security community is sorely needed. Kitisak is a central figure in that community. He has worked on establishing the OWASP Bangkok chapter for the past six years, organizing meetups, community outreach and engaging with security experts internationally. His work has played a pivotal role in creating IT security awareness in the fast-growing South-East-Asian country.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|James Manico&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Jim's influence on OWASP materials (and therefore on application security) is amazing - he's cited on nearly every cheat sheet on OWASP Top 10 document. His name is synonymous with application security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation: &amp;quot;'''While Jim may not be the &amp;quot;unsung hero&amp;quot; - he is the first and foremost cheerleader/champion of OWASP. His efforts and contributions are innumerable. As anyone who knows Jim - he is not a reserved individual when touting the resources available via OWASP. He has likely done more then anyone else working with OWASP to bring together, motivate, and get individuals to contribute to OWASP. From the immensely popular checklists to motivating individuals to contribute. OWASP would not be nearly as successful as it has been without Jim.&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|Mateo Martinez&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Mateo is one of the leaders in Latin America more recognized, during the last years his efforts to join the chapters chapter along with other leaders of Latam made that the community grew and that today the Latam Tour 2017 has more than 15 participating countries. He also managed to spread the spirit of owasp and help establish new chapters in the region.&lt;br /&gt;
The effort to maintain more communication between OWASP GLobal and local communities is reflected in each activity that encourages other leaders to ensure that they strive every day to spread Owasp projects and to grow the community.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Miller&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The OWASP Podcast is a effort that is in line with the mission of OWASP raising visability for software security. This is a VERY powerful voice in the community globally and Mark Miller should be applauded for his efforts on this&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Podcast&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj was nominated for WASPY 2016, his contribution to the community is from past one 'n half year in various areas, start from the projects, local volunteering and what not, he was also listed in OWASP Hall Of Fame.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Owen is an active participator in OWASP meetings and has been a great inspiration to me.&lt;br /&gt;
He has shown himself to be a great leader and OWASP advocate.&lt;br /&gt;
Owen has recommended other AppSec communities in which I have become involved in since moving to Dublin. He is an evangelist for women in technology and I have witnessed this first hand.&lt;br /&gt;
I don't hesitate to recommend Owen for this award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Owen has introduced me to the OWASP Community in Ireland and EU. Help me to get involve with Women in AppSec and participate in the AppSec EU event in Belfast. He is a great leader, who enjoys talking about OWASP and the great community behind it.&lt;br /&gt;
I've moved to Ireland a couple of months ago, and getting to know Owen and the OWASP community has completely changed my life, both professionally and personally. &lt;br /&gt;
So, yes, I would like to nominate Owen Pendlebury because he the proof that Women in AppSec is not just a women matter. :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram Shyam]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sriram has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Noreen Whysell&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Noreen is helping each day to improve OWASP members' experiences bringing her expertise and knowledge as a mentor and projects as a Chapter Leader, one member at a time. She understands what members want, how to improve member benefits and is applying that knowledge to improving local and global member experiences from the ground up. Her efforts are multiplied by her sharing of knowledge and grassroots approach creating a membership groundswell.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Sean leads the BLT Project and is a Team Leader for the Learning Gateway project. He has helped improve the quality of web experiences, including OWASP.org .&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Glenn &amp;amp; Riccardo ten Cate&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;I am hereby nominating the brothers Glenn &amp;amp; Riccardo ten Cate from the Netherlands for the WASPY award in this category. They are known for their work on the open-source project SKF (Security Knowledge Framework). These are two guys who are dedicated to spreading security knowledge trough the means OWASP has to offer. You might have encountered them talking at seminars, promoting their project and OWASP, or different companies where they teach development teams how to integrate the OWASP core principles in their workflow using their project. Not only professional development teams but also students of security can only be amazed at the sheer knowledge they gathered and contribute to the global OWASP community trough open source. The sheer effort they put in this project teaches, guides, structures and shows by example how to test and write secure applications by design. There is no other software out there that does this. And that is why they deserve this nomination for best innovator 2017.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Deenihan&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Mark for his constant devotion and work on the OWASP security shepherd project and continuing to develop it and teach people globally about app sec.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Seba Deleersnyder&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;One of the main projects to date is SAMM. Seba with the support of project colliders has made this a flagship project of OWASP. The level of maturity and the number of improvements obtained indicates that this project is one of the most mature and a great projection to the future.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Chris' projects are opening doors for OWASP in the standards development and getting the word out about important IoT with his Medical Device Deployment Standard: &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Secure_Medical_Device_Deployment_Standard&amp;lt;/nowiki&amp;gt; which already has a Turkish translation and attracted attention from the Turkish public health department. He has delivered presentations at meetups, and presenting to the IDESG, www.idesg.org in July. He has a &amp;quot;soup label&amp;quot; tool that gives simple guidance for the implementation of the OSMDDS. This is not Chris' first project but it is surely one of the best OWASP innovations of the year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Brianglas Brian Glas]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Brian has been paramount in 2 very strategic initiatives for OWASP. He is not only a Project Leader for the OWASP SAMM project but he has been instrumental in revamping the call for data and reorganizing the flagship OWASP Top Ten. Brian continues to support and speak about the benefits of supporting OWASP especially projects and participating in the Summit. Please consider Brian Glas as the Best Community Supporter for this year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Evin Hernandez&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Evins focus on the core of the information security platform with Virtual Village has provided the global community with a place to experiment and leverage for testing... &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Virtual_Village_Project&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Jeremy Long&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Considering how often projects have a great start and plateau, we should recognize the ongoing effort and dedication given to one of the Flagship projects in our community.&lt;br /&gt;
Jeremy Long has continued to not only maintain the Dependency Check project but develop and improve it each year.&lt;br /&gt;
This year he added Improvements in the core dependency-check platform in terms of code quality, achieved 100% for the CII Best Practices for dependency-check, continued to develop the ODC community with several contributors submitting PRs, and over the last several months he's been working on platform maturity and will be releasing 2.0.0 in the first half of July 2017.&lt;br /&gt;
After 2.0 is released he has planned work on Python support and expanding the tool by integrating additional data-sources such as Artifactory, Redhat Victim's, OSS-Index, etc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Jeremy has been an avid contributor/leader for the OWASP dependency-check project. Under his leadership the project has garnered substantial community support in terms of pull requests, improved code quality via Sonarcloud, Coverity, Codacy, and CII Best Practices. While the last six months have been primarily around code quality and bug fixes; these improvements are setting the dependency-check project up for major enhancements over the coming months!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Daniel Miessler&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Daniel seems to be everywhere at once - despite have a full-time job, he is leading or co-leading several OWASP projects, has created ideas for groups out of thin air, and has performed work in much needed areas.&lt;br /&gt;
This year, Daniel has lead or co-lead the Internet of Things security project, completed an IoT: Medical Devices attack surface overview, and created the Game Security project.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj is one of the top contributor in OWASP Cheat Sheet Project, which have security guidance in an easy read format, his contribution for SQL Injection WAF Bypass and XSS Evasion - OWASP, was mostly recommended and used by Cyber Security professional, dhiraj has contributed to Benchmark project by contributing SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring and many such projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Bernhard Mueller&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;During the last 18 months Bernhard has been spearheading the OWASP Mobile Testing Guide Project. He has invested several man-months of writing, editing, reviewing, rallying authors, and pushing the project into new directions. This also resulted in the novel agile book writing process and book production pipeline which enables OWASP to produce a professional tech book. The project has produced a security standard and early-release ebook, and is on track become one of OWASP's main flagship projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Steve's work on dependency-track is fantastic - he's moved forward to address the next round of issues, with an innovative solution all companies can leverage.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|thc202&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Simon Bennets &amp;quot;wingman&amp;quot; in the ZAP project, by now even the top committer in the project! (&amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/graphs/contributors&amp;lt;/nowiki&amp;gt;) So &amp;quot;unsung of&amp;quot; that I do not even know his real name!&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Coming July 25, 2017&lt;br /&gt;
&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!&lt;br /&gt;
&lt;br /&gt;
Sponsorships coming soon!&lt;br /&gt;
&lt;br /&gt;
==Communication==&lt;br /&gt;
# June 7, 2017 Email to the Leaders &amp;amp; Community list. Posted to the OWASP [https://owasp.blogspot.com/2017/06/nominations-are-now-being-accepted-for.html Blog]&lt;br /&gt;
# June 30, 2017 Email to the Leaders &amp;amp; Community list.&lt;br /&gt;
# July 5, 2017 Email to the Nominees&lt;br /&gt;
# July 5, 2017 Email to the Leaders &amp;amp; Community list, and Blog post announcing the nominees have been announced.&lt;br /&gt;
&lt;br /&gt;
=='''Past WASPY Awards'''==&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2016 2016]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2015 2015] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2014 2014] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2013 2013] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2012 2012] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231437</id>
		<title>WASPY Awards 2017</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=WASPY_Awards_2017&amp;diff=231437"/>
				<updated>2017-07-07T16:57:43Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: Created a link to Joaquin Fuentes's User Page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[File:WASPY 2017 Banner.jpg]]&lt;br /&gt;
&lt;br /&gt;
==Purpose of the Awards==&lt;br /&gt;
&lt;br /&gt;
Each year there are many individuals who do amazing work, dedicating countless hours to share, improve, and strengthen the OWASP mission. Some of these individuals are well known to the community while others are not. &lt;br /&gt;
&lt;br /&gt;
'''The purpose of these awards is to bring recognition to those who &amp;quot;FLY UNDER THE RADAR&amp;quot;. These are the individuals who are passionate about OWASP, who contribute hours of their own free time to the organization to help improve the cyber-security world, yet seem to go unrecognized.''' &lt;br /&gt;
&lt;br /&gt;
==Timeline==&lt;br /&gt;
Call for Nominees Opens June 7, 2017  &lt;br /&gt;
&lt;br /&gt;
Call for Nominees Closes June 30, 2017 - CLOSED &lt;br /&gt;
&lt;br /&gt;
Announcement of Nominees per Category July 5, 2017 - DONE &lt;br /&gt;
&lt;br /&gt;
Deadline for Nominee Profile Picture and Bio to be created and added to the Nominees section July 10, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Opens July 17, 2017 &lt;br /&gt;
&lt;br /&gt;
Voting for Board &amp;amp; Staff Members Closes July 24, 2017  &lt;br /&gt;
&lt;br /&gt;
Winners are Notified July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Announcement of Winners to the Community July 25, 2017 &lt;br /&gt;
&lt;br /&gt;
Award Ceremony at AppSecUSA 2017 in Orlando, FL September 21-22, 2017 &lt;br /&gt;
&lt;br /&gt;
==Categories==&lt;br /&gt;
The WASPYs celebrate the actors in our community who grow OWASP and drive innovation to the safety and security of the world’s software. This year we are excited to offer three categories.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Community Supporter''' - The WASPY for COMMUNITY honors members who create dynamic INTERACTION and LEARNING opportunities for the OWASP Community.  Nominees to the Community WASPY Award create collaborative and inclusive environments and grow the OWASP Community.  WASPYs focus on the unsung heros of the OWASP community.  Chapter Leaders and Community Members should especially consider leaders and volunteers who bring something extra to the environment, help the chapter reach out to new attendees, or carry out the tedious and repetitive tasks that make growing an OWASP Chapter possible.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Mission Outreach'''  - The WASPY for Mission Outreach honors community members who help the community GROW.  Growth can happen inside the larger OWASP community or outside it in the broader AppSec and development communities.   Leaders and Members should especially consider volunteers who pushed the boundaries of the audience and reach of OWASP to provide new exposure for OWASP’s projects and chapters.  New leaders and volunteers who help bring more people to your chapter, project, or actively represent OWASP at non-OWASP events, gatherings, and activities to build an active OWASP community are ideal candidates for the Mission Outreach WASPY award.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Best Innovator'''  - The WASPY for Innovation is given to a community member who has contributed to the TECHNICAL advancement of OWASP in the past year.  This advancement is usually through an [[:Category:OWASP Project|OWASP Project]] and can be in the form of code, an application, or anything that materially makes the AppSec community better in a unique way.  WASPYs focus on the unsung heros of the OWASP community who quietly go about making the world a bit better for their work.  Project Leaders and Community Members should especially consider nominating new projects, projects that have recently graduated, and project contributors for this WASPY.&lt;br /&gt;
&lt;br /&gt;
==Rules==&lt;br /&gt;
'''Remember the purpose of these awards is to recognize the UNSUNG HEROS out there, that are barely recognized for their contributions to the OWASP Foundation.''' &lt;br /&gt;
&lt;br /&gt;
1. [https://www.owasp.org/index.php/About_OWASP#2015_Global_Board_Members Board members] may not be nominated &lt;br /&gt;
&lt;br /&gt;
2. [https://www.owasp.org/index.php/About_OWASP#Employees_and_Contractors_of_the_OWASP_Foundation Employees &amp;amp; Contractors] may not be nominated &lt;br /&gt;
&lt;br /&gt;
3. All nominees will remain anonymous until July 3, 2017&lt;br /&gt;
&lt;br /&gt;
4. Anyone can nominate an &amp;quot;unsung hero&amp;quot; who has contributed in some way to OWASP who they feel best fits each category &lt;br /&gt;
&lt;br /&gt;
5. You may only nominate one person per category &lt;br /&gt;
&lt;br /&gt;
=='''And the Nominees Are...'''==&lt;br /&gt;
{| cellpadding=&amp;quot;2&amp;quot; border=&amp;quot;1&amp;quot;&lt;br /&gt;
! width=&amp;quot;150&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Name&lt;br /&gt;
! width=&amp;quot;800&amp;quot; align=&amp;quot;center&amp;quot; scope=&amp;quot;col&amp;quot; |Category &amp;amp; Citation&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; |Aatral Arasu&lt;br /&gt;
|'''''Best Community Supporter''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Sean has not only worked as a volunteer in the local chapter building community, his code projects are useful to the mission and his outreach efforts have included funding requests for OWASP Foundation to grow its mission. Sean is a great example of a community member.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Nicole Becher&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Nicole has been an amazing chapter leader. She brings knowledge and experience teaching cybersecurity to the Mentor Initiative, WIA Committee, and projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Ken Belva&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Ken is a long time chapter leader of the NYC chapter and a former chapter leader of the Brooklyn Chapter. Ken is always willing to step in and volunteer to help with OWASP initiatives and is a frequent participant in OWASP events as both a volunteer and speaker. Ken has spoken at AppSec USA on XSS techniques (&amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=G539NwvpL3I&amp;lt;/nowiki&amp;gt;) and is the project lead for the Basic Expression and Lexicon Variation Algorithms project (&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Basic_Expression_%26_Lexicon_Variation_Algorithms_(BELVA)_Project)&amp;lt;/nowiki&amp;gt;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tony has selflessly brought the OWASP dublin chapter to great nights. He has nurtured the chapter to be inclusive and open whilst growing the average attendee count to hundreds. He has spread the word across both security industry and developer industry and has also managed to get various organisations to work together such as ISACA, IISF, ISSA and ISC2. He is a great leader and despite detractors has built the chapter and awareness of software security issues in a strong vendor neutral manner to a great place. Tony is a great example of OWASP and industry leadership.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dinis Cruz&lt;br /&gt;
|&amp;lt;nowiki/&amp;gt;'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Diniz is a fantastic innovator and motivator. As the mastermind and organizer behind the OWASP Summit he has managed to re-energize the OWASP community - many interesting projects would not have happened (or at least, not been that successful) without his passionate work. Besides organizing the event, he also consistently supported project leaders with his experience and ideas.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' Dinis put ridiculous effort (&amp;lt;nowiki&amp;gt;https://github.com/OWASP/owasp-summit-2017/commits?author=DinisCruz&amp;lt;/nowiki&amp;gt;) into the OWASP Summit 2017 and didn't tire promoting this event!&lt;br /&gt;
|-&lt;br /&gt;
|Christian Folini&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Christian Folini is very active in the Core Rule Set project community. He responds to a ton of questions submitted by newcomers when they are stuck and he answers expert level questions with stunning detail. He joined Chaim and Walter when they revived the project in 2016 and I heard he had the idea for the famous CRS3 release poster &amp;lt;nowiki&amp;gt;https://modsecurity.org/crs/poster&amp;lt;/nowiki&amp;gt; that was shared all over the net.  I think it's people like him that give OWASP a human face.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Fuentes.joaquin|Joaquin Fuentes]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;In 2015, Joaquin took it upon himself to revive the OWASP Phoenix Chapter. He created a meet-up group to gain broader visibility. Since 2015, the meeting attendance has grown from an average of 15 attendees to over 60! Joaquin dedicates a lot of time and effort into scheduling an impressive variety of presentation topics including safe hacking, vulnerability scanner deep dives, hands on web exploitation CTF, video game hacking and more. I learn something new and cool at every event.&lt;br /&gt;
&lt;br /&gt;
More importantly, Joaquin works hard to foster a friendly, inclusive environment. During our hands-on web exploitation session, Joaquin recruited co-works to assist participants with the Security Shephard challenges so no one felt overwhelmed or impossibly stuck. He always takes the time meet and welcome new members. For example, my 17-year-old son attends meetings with me. He looks up to Joaquin as a mentor for a future information security career because Joaquin encourages his learning and offers career guidance.&lt;br /&gt;
&lt;br /&gt;
I highly recommend Joaquin for a WASPY award!! He is a kind, soft spoken person with a passion for sharing information security and helping others!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;He resurrected the Phoenix chapter and has kept it going with great content.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation:''' &amp;quot;Put simply, due to the efforts of Joaquin Fuentes, the Phoenix chapter has risen from the ashes (some pun intended). Before Joaquin took over the chapter there were consistently between 5-10 persons in attendance, Joaquin himself being one of them, and the chapter only met about every 3 months or so. Since Joaquin took over the chapter, we have had fantastic presenters each month, paid for dinners, along with a collaborative, comfortable, and engaging environment to meet in. Even more impressive the attendance has grown to 60+ consistently. Joaquin isn't even done yet! He is more great ideas and plans for the chapter that will undoubtedly contribute to the continued growth and over all quality of this once fallen chapter. When he speaks of where this chapter has come from and his plans for the future, it is undeniable to all that he does so with the passion that a leader must possess to accomplish that which Joaquin has.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''5th Citation:''' &amp;quot;I am sure someone else will write in with Joaquin's email, but I felt the need to second his name on the list. The events he puts together are top notch, have excellent speakers, always have things to eat, and are generally excellent. I almost never miss them. He is actually so gracious about the entire chapter that I am sure he does not get the credit he deserves... the whole show is put on by just him, I think. Yay Joaquin!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''6th Citation:''' &amp;quot;A few years ago, the Phoenix (AZ) OWASP group was basically defunct. As the leader of the Phoenix OWASP group, not only has Joaquin helped to resurrect the group, but we've had great presentations on reverse engineering, secure coding, a hands-on CTF contest with Security Shepherd, etc. Joaquin is a very visible member of the security community being an employee at Early Warning, which not only hosts the OWASP meetings, but also is a sponsor and makes a strong showing at CactusCon every year, the biggest security conference in Arizona.&lt;br /&gt;
&lt;br /&gt;
Our local OWASP group is not strong, going from being non-existent a few years ago to now getting a regular attendance of 40-80 people. I've gotten to know Joaquin through OWASP meetings and other security events in the area I have crossed paths with him, and he is a fine representative and evangelist for the OWASP organization.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''7th Citation:''' &amp;quot;Joaquin is the Phoenix OWASP Chapter leader and regularly plans amazing talks with great speakers for the Phoenix Community. Frequently, the Phoenix OWASP talks will have over 50 attendees which Joaquin manages without a problem! Joaquin also pushes for candidates he is interviewing to be familiar with OWASP before their interview.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''8th Citation:''' &amp;quot;Joaquin is the leader for the Phoenix OWASP, and it is clear that through his leadership the Phoenix OWASP thrives. Joaquin organizes all the meetings, and is constantly working with folks to create an excellent sense of community in the Phoenix area.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''9th Citation:''' &amp;quot;Joaquin has taken the Phoenix OWASP chapter that had not been managed for years and brought it back to life. We consistently see 50+ members coming to our Meetups to talk about AppSec related topics. Joaquin is well connected to the InfoSec groups and has had great success in pulling in new speakers, we have already had a few speakers who are prepping their BlackHat and DefCon talks by giving their presentations to our local chapter. Finally Joaquin does a great job by reaching out to the local colleges and supporting CTF activities to garner interest in pen-testing and the OWASP community. He is a true community supporter and fully deserves a WASPY for his efforts...&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''10th Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''11th Citation:''' &amp;quot;As a leader of Phoenix OWASP chapter, Joaquin strives to organize talks and trainings to make people in the valley learn InfoSec and AppSec from experienced individuals. He has always gone a step ahead to conduct OWASP meetings that are informative and hands on. Right from giving Arizona State University (ASU) students an overview of basic InfoSec and career opportunities to organizing a hands on hacking workshop for people in the community, Joaquin has always demonstrated passion and determination to take Phoenix to a better place in the field of Cyber Security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''12th Citation:''' &amp;quot;I've attended and participated in three OWASP meetings lead by Joaquin. They are always well organized, offer a great learning experience and considerably contribute to the community. His continuous interest and dedication to the Phoenix chapter do not go unnoticed and are appreciated by all who attend.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''13th Citation:''' &amp;quot;Joaquin restarted the OWASP chapter in Phoenix/Scottsdale. Chapter meetings have grown significantly to where there were about 65 attendees at the most recent meeting with hundreds more on the mailing list (I was at the meeting, but I've only heard about the mailing list). As someone who works with him, I know how dedicated he is to the work of IT security and he's been able to attract top-notch speakers for OWASP meetings.'&lt;br /&gt;
&lt;br /&gt;
'''14th Citation:''' &amp;quot;Joaquin had successfully revived the Phoenix OWASP Chapter. Since, the chapter has excelled from zero to filled audience bringing security talent from all around to speak and educate to security professionals on the many facets of security domains.&lt;br /&gt;
&lt;br /&gt;
Additionally, this has provided a great forum to network with the many security professionals around the community and share their knowledge and strengthen the security community. &lt;br /&gt;
&lt;br /&gt;
Joaquin has provided his unselfish time as an OWASP Chapter leader, and has breathed new life into the Chapter.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''15th Citation:''' &amp;quot;Joaquin does a bang up job of running the Phoenix OWASP chapter. He does a great job of raising awareness and bringing folks from the infosec community into the fold.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''16th Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''17th Citation:''' No citation was submitted&lt;br /&gt;
|-&lt;br /&gt;
|Brendan Gormley&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Throughout the Brendan has not only assisted in making the dublin chapter events happen but taken a lead role. Brendan has organised venues and speakers for these events often going above and beyond to ensure success. Brendan has also been involved in some of the outreach programs the Dublin chapter had been involved in. No task is too big or too small for Brendan and without him I don't believe the Dublin chapter would be what it is.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tanya Janca&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Jeremy Long&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Jeremy is a dedicated security engineer who contributes to the community as a developer, mentor, contributor and leader. He's one of the smartest people I know - and one of the few who has patience with &amp;quot;the rest of us&amp;quot;. He is generous with his time and knowledge, helping not only to contribute apps and resources, but to build up the community itself.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Akash Mahajan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Akash has been backbone of OWASP bangalore chapter he has done lot of work for evangelizing OWASP. For more than 7 years now he has been working with the chapter and mentored lot of folks. No wonder he is called &amp;quot;the web app security guy&amp;quot;.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Dhiraj Mishra - has been contributed and volunteered to, OWASP Mumbai Student chapter and Mumbai local chapter.&lt;br /&gt;
&lt;br /&gt;
He has endorse students to be part of multiple open community, however been an Sudent Chapter leader for OWASP he has discussed and shared multiple Information Security topics start from the scratch and spreading the idea's and awareness via chapter Meets, he has taken multiple session in NULL as well which runs with OWASP local chapter Mumbai, recently he invited Mozilla Club Mumbai to student chapter so that students can go to their area of interest, he always pushup/boost women in infosec. Apart from this he has taken various sessions in different colleges and have shared knowledge about Cyber Security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Denise Murtagh-Dunne&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Denise has been a hugely active member of the Dublin chapter and has been involved in all chapter meeting throughout the year and is ever keen to role up her sleeves and get stuck into work that others shy away from. This includes everything from setting up the meeting tools, organising venues, working with sponsors, getting speakers and assisting speakers in the run up and during events. She's been a very positively influence on the community and chapter and has encouraged other people to get involved. She's constantly updating and posting content on our social media accounts and making sure our members get relevant and interesting content. While in full time employment, Denise gives up family time to contribute to the chapter and ensure OWASP Dublin remains a vibrant and relevant group that engages the developer and security community locally.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Owen Pendlebury has been a key local OWASP volunteer over the last number of years. From being on the local Dublin chapter board to leading the Dublin chapter he regularly hosted and spoke at numerous collaborative and insightful security meetups.&lt;br /&gt;
&lt;br /&gt;
He has also been involved in organising AppSec EU in Rome and more recently co-organised the Belfast conference which was the biggest ever EU conference. As part of organising the conference in Belfast he negotiated that all chapters within Ireland would benefit financially getting a percentage of the conference profits to allow the chapters to bring bigger, better and more collaborative meetings to the Irish OWASP community and grow the communities across the country. &lt;br /&gt;
&lt;br /&gt;
I don’t know where he has found the time but has also been part of the Women in AppSec committee mentoring a number of individuals throughout the year. He took part in the Women in AppSec events in Belfast giving some insightful opinions into how improve attendees career. Owen is an asset that helps to improve Ireland's security community’s capabilities with a real can-do attitude.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mick Ryan&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Mick always assists with chapter meetings and works to ensure we give the community good quality sessions. Mick assists will all areas including reaching out to potential speakers, getting info and bios from them, arranging dates and venues, posting on social media and the logistics of the meetings and ensuring speakers have the right cables, meetings run to time, that speakers are happy with everything, taking photos to promote the chapter on social media, encouraging people to speak, printing the chapter and getting people to events! Thanks Mick for your contribution in 2017!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;[https://www.owasp.org/index.php/Sriram Sriram] has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone. Sriram has been tremendously supporting the OWASP Chapter by giving trainings to various college student,  corporates and various chapters..&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Michelle Simpson&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&amp;quot;Michelle has done an amazing job with the Belfast chapter and works tirelessly to improve the OWASP community and advocate strong app sec practices. This is very evident from the people attending the chapter events, organisations participating and the very successful AppSecEU conference that was held in Belfast in 2017. Michelle put a huge amount of work and effort into planning and preparation for AppSecEU to ensure the conference was of a high calibre. This was a sustained commitment over the majority of 2017 on top of local chapter commitments. I'd like to nominate Michelle for all the hard work and effort she puts into the chapter. Thanks Michelle!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Steve has been a tremendous supporter of the OWASP dependency-check project and leader on the related dependency-track platform. He is quick to respond to community question, answering with insightful and accurate responses assisting the community in their use of the dependency-check suite of tools.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/John_Vargas John Vargas]&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;During the last 9 years John, together with a very small group of volunteers, has been making efforts to keep the chapter of Lima, Peru. Performing activities such as monthly meetings, internal trainings and participating actively in the OWASP Latam Tour. For the chapters in Latin America to keep afloat these activities with few resources is something very complicated and deserves recognition.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tara Williams&lt;br /&gt;
|'''''Best Community Supporter'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Tara cares about integrity, inclusion and transparency, she is passionate about making OWASP a better place for all members of the community. With her talents in communications, she is getting the word out about OWASP's benefits to community members and attracting new members to chapter meetings, especially identifying successful pathways to transition meetup members to full members.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
'''&amp;quot;'''A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sean mentors, is a speaker, leads projects, is an active chapter leader and chapter Treasurer, participating in meetup events and a great representative at global, regional and external events.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tony Clarke&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tony has grown the chapter over the last year to a point where hundreds of people are attending meetings. The meetings are organised in advance now and have a theme. There were some really interesting people speaking at the chapter meetings including Simon Singh, James Lyne, Brian Honan and Jane Franklin. He has also engaged support from local companies with a lot more attending and sponsoring the chapter. There is a real buzz at chapter meetings and they're not just death by PowerPoint which they had been in the past.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
'''&amp;quot;'''Christopher Frenz should be nominated for the Best Mission Outreach WASPY for his work as the Project Lead for the OWASP Anti-Ransomware Guide Project and the OWASP Secure Medical Device Deployment Standard Project. In the wake of WannaCry, anti-ransomware guidance has become more pertinent than ever and the project is regularly updated to keep abreast of the latest ransomware adaptations. Chris regularly shares his anti-ransomware knowledge with the security and healthcare communities and is an advocate for organizations conducting mock ransomware incidents. Chris has shared his knowledge of ransomware protections and of pertinent OWASP resources in numerous venues including articles (&amp;lt;nowiki&amp;gt;https://iapp.org/news/a/why-the-wannacry-outbreak-should-be-a-wake-up-call/&amp;lt;/nowiki&amp;gt;) and conference presentations at both the local and international level (&amp;lt;nowiki&amp;gt;https://iapp.org/conference/iapp-canada-privacy-symposium/sessions/?id=a191a000000zrqPAAQ&amp;lt;/nowiki&amp;gt;). A Spanish version of the guidance is also available. In addition, he has worked to call attention to the need for healthcare facilities to improve the security of their medical device implementations and is responsible for authoring version 1 of the OWASP Secure Medical Device Deployment Standard. The project has really worked to raise awareness of these issues and has been covered by CSO magazine (&amp;lt;nowiki&amp;gt;http://www.csoonline.com/article/3188230/security/how-to-securely-deploy-medical-devices.html&amp;lt;/nowiki&amp;gt;) and other news sources. Chris has given interviews on medical device security for the Cloud Security Alliance and others and will be speaking on medical device security at the Defcon BioHacking Village. Chris is always willing to share his knowledge with all who ask and is an active member of the NYC and Brooklyn OWASP chapters.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Joaquin Fuentes&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;For all he has done to build up the Phoenix OWASP community. Prior to Joaquin taking point the community in Phoenix was dead. Meetings weren't happening on a regular basis. The prior leaders had done a great job but I think they had burnt out. Joaquin started the community back up and got corporate support from his employer to facilitate not only regular meetings but great meetings with great content. He also implemented MeetUp. I'm not a consistent attendee because of my work/life schedule but I always know when the meetings are happening and what the subject matter will be because of Joaquin utilizing MeetUp.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation''': &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''4th Citation''': &amp;quot;My job takes me to many different OWASP Chapters, along with ISSA, CSA, ISACA, etc.&lt;br /&gt;
The Phoenix OWASP Chapter was DEAD before Joaquin volunteered to lead the Chapter a few years ago.&lt;br /&gt;
It is now consistently one of the BEST ITSec community gatherings, and I go out of my way to be in Phoenix for their meetings.&lt;br /&gt;
To put it a different way, at my first Phoenix OWASP meeting there were less than 12 attendees, including myself and the speaker. Last week it was standing room only (75+) *and* there would have been more if Interstate 17 hadn't been closed in both directions at the start of rush-hour.&lt;br /&gt;
Part of the reason Joaquin deserves this award is that he is EXTREMELY knowledgeable about AppSec and many other aspects of data security and he is ALWAYS friendly and willing to share. His day-job is no picnic, but he finds the time to put together great meetings and do it in a way that everybody has a good time.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Tanya Janca&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Tanya has been instrumental in outreach in the Ottawa Ontario Canada region building membership and participation in the local OWASP chapter, as well as building bridges with other local organizations (Python user group, Ruby Rails user group, WIA, etc.). Tanya has also been a driver in getting a mentoring program setup via the Ottawa chapter. She has also encouraged participation in local CTF events, presented at local conferences (BSides, etc). Tanya's enthusiasm, support, and interaction is often contagious (in a good way :) ). Lastly, Tanya is a strong advocate or evangelist for OWASP projects, promoting such as appropriate per audience/presentation (including, but not limited to: ZAP, Top 10, SKF).&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Tanya Janca is an excellent ambassador for OWASP. Since her entry into the lead team of the OWASP Ottawa chapter, she has doubled the size of the chapter and developed the chapter into a meeting place for dozens of women interested in Application Security.&lt;br /&gt;
Tanya Janca is an energetic speaker who held a fantastic presentation at AppSecEU in Belfast. &amp;lt;nowiki&amp;gt;https://www.youtube.com/watch?v=mPTmuaC2lOI&amp;lt;/nowiki&amp;gt; She was subsequently invited to the Swiss Cyberstorm Conference where her addition to the rooster was explained in an admiring blogpost &amp;lt;nowiki&amp;gt;https://swisscyberstorm.com/2017/05/23/Introducing_Tany_Janca.html&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
Tanya Janca has the ability to talk security to techies and management alike. She is pushing for the adoption of OWASP practices and project by the government of Canada her employer. Having received the Government of Canada’s CIO Award for “Excellent in Security” in 2016 she refused to move into the private sector, but continues to support the security community inside the public sector, where her excellent know-how is very important.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''3rd Citation:''' &amp;quot;Tanya Janca has been performing “outreach” and “recruitment of women” as her main chapter leader responsibilities for the Ottawa chapter since 2015. The chapter has not only grown by over 500% in that time, but female membership has grown from 2 female members to over 70 (the chapter has grown for many reasons, some of which are her promotional efforts). Activities include starting a mentoring program that matches senior AppSec members of the community with juniors or people who are hoping to get into Application Security; attending all sorts of technology meetups (but especially female-centric ones) to talk about OWASP and personally invite them to attend; bringing OWASP products, concepts and resources to the Canadian Government (and is currently attempting to sway policy to be more application security focused as we speak); as well as performing over 40 public speaking engagements that describe OWASP as “Your new BFF” as part of the application security lesson she has taught. She has also begun speaking at conferences semi-regularly, singing OWASP’s praises as part of every presentation. She also forms female groups to attend events together, to make them more accessible, such as her all-female team for the Ottawa iHack CTP and “Learn by Breaking things” event in June 2017 and her all female CTF team for OWASP Ottawa’s first CTF in 2015. Her claim of being an “application security evangelist” certainly seems fitting.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Kitisak Jirawannakool&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Web security is notoriously bad in Thailand, so an actives security community is sorely needed. Kitisak is a central figure in that community. He has worked on establishing the OWASP Bangkok chapter for the past six years, organizing meetups, community outreach and engaging with security experts internationally. His work has played a pivotal role in creating IT security awareness in the fast-growing South-East-Asian country.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|James Manico&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Jim's influence on OWASP materials (and therefore on application security) is amazing - he's cited on nearly every cheat sheet on OWASP Top 10 document. His name is synonymous with application security.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation: &amp;quot;'''While Jim may not be the &amp;quot;unsung hero&amp;quot; - he is the first and foremost cheerleader/champion of OWASP. His efforts and contributions are innumerable. As anyone who knows Jim - he is not a reserved individual when touting the resources available via OWASP. He has likely done more then anyone else working with OWASP to bring together, motivate, and get individuals to contribute to OWASP. From the immensely popular checklists to motivating individuals to contribute. OWASP would not be nearly as successful as it has been without Jim.&amp;quot; &lt;br /&gt;
|-&lt;br /&gt;
|Mateo Martinez&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Mateo is one of the leaders in Latin America more recognized, during the last years his efforts to join the chapters chapter along with other leaders of Latam made that the community grew and that today the Latam Tour 2017 has more than 15 participating countries. He also managed to spread the spirit of owasp and help establish new chapters in the region.&lt;br /&gt;
The effort to maintain more communication between OWASP GLobal and local communities is reflected in each activity that encourages other leaders to ensure that they strive every day to spread Owasp projects and to grow the community.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Miller&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;The OWASP Podcast is a effort that is in line with the mission of OWASP raising visability for software security. This is a VERY powerful voice in the community globally and Mark Miller should be applauded for his efforts on this&lt;br /&gt;
&amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Podcast&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj was nominated for WASPY 2016, his contribution to the community is from past one 'n half year in various areas, start from the projects, local volunteering and what not, he was also listed in OWASP Hall Of Fame.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:Owen_Pendlebury|Owen Pendlebury]]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Owen is an active participator in OWASP meetings and has been a great inspiration to me.&lt;br /&gt;
He has shown himself to be a great leader and OWASP advocate.&lt;br /&gt;
Owen has recommended other AppSec communities in which I have become involved in since moving to Dublin. He is an evangelist for women in technology and I have witnessed this first hand.&lt;br /&gt;
I don't hesitate to recommend Owen for this award.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Owen has introduced me to the OWASP Community in Ireland and EU. Help me to get involve with Women in AppSec and participate in the AppSec EU event in Belfast. He is a great leader, who enjoys talking about OWASP and the great community behind it.&lt;br /&gt;
I've moved to Ireland a couple of months ago, and getting to know Owen and the OWASP community has completely changed my life, both professionally and personally. &lt;br /&gt;
So, yes, I would like to nominate Owen Pendlebury because he the proof that Women in AppSec is not just a women matter. :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/Sriram Sriram Shyam]&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&amp;quot;Sriram has been conducting awareness program to the college students. Sriram has created awareness among 12000 Students without the support of anyone.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Noreen Whysell&lt;br /&gt;
|'''''Best Mission Outreach'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Noreen is helping each day to improve OWASP members' experiences bringing her expertise and knowledge as a mentor and projects as a Chapter Leader, one member at a time. She understands what members want, how to improve member benefits and is applying that knowledge to improving local and global member experiences from the ground up. Her efforts are multiplied by her sharing of knowledge and grassroots approach creating a membership groundswell.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Aatral Arasu&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;A great leader always there to help responds to emails quickly loves his work works very hard every day very supportive never loses focus strong willed very technical and willing to do things himself to get the job done when asked for something he will get it to you ASAP constant learner open to suggestions and ideas on how to be better respectful honest caring and I am certain HRC will make it big very soon :)&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Sean Auriti&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Sean leads the BLT Project and is a Team Leader for the Learning Gateway project. He has helped improve the quality of web experiences, including OWASP.org .&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Glenn &amp;amp; Riccardo ten Cate&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;I am hereby nominating the brothers Glenn &amp;amp; Riccardo ten Cate from the Netherlands for the WASPY award in this category. They are known for their work on the open-source project SKF (Security Knowledge Framework). These are two guys who are dedicated to spreading security knowledge trough the means OWASP has to offer. You might have encountered them talking at seminars, promoting their project and OWASP, or different companies where they teach development teams how to integrate the OWASP core principles in their workflow using their project. Not only professional development teams but also students of security can only be amazed at the sheer knowledge they gathered and contribute to the global OWASP community trough open source. The sheer effort they put in this project teaches, guides, structures and shows by example how to test and write secure applications by design. There is no other software out there that does this. And that is why they deserve this nomination for best innovator 2017.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Mark Deenihan&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Mark for his constant devotion and work on the OWASP security shepherd project and continuing to develop it and teach people globally about app sec.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Seba Deleersnyder&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;One of the main projects to date is SAMM. Seba with the support of project colliders has made this a flagship project of OWASP. The level of maturity and the number of improvements obtained indicates that this project is one of the most mature and a great projection to the future.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[[User:cfrenz|Christopher Frenz]]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Chris' projects are opening doors for OWASP in the standards development and getting the word out about important IoT with his Medical Device Deployment Standard: &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Secure_Medical_Device_Deployment_Standard&amp;lt;/nowiki&amp;gt; which already has a Turkish translation and attracted attention from the Turkish public health department. He has delivered presentations at meetups, and presenting to the IDESG, www.idesg.org in July. He has a &amp;quot;soup label&amp;quot; tool that gives simple guidance for the implementation of the OSMDDS. This is not Chris' first project but it is surely one of the best OWASP innovations of the year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Joaquin Fuentes&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Joaquin has been leading the OWASP Phoenix chapter and due to his initiative, has placed Phoenix on the map as a hub for application security. I would like to nominate him because he is always bringing in new and interesting speakers that provide great content. The most recent OWASP chapter meeting had over 60 attendees!&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Joaquin Fuentes has had a big impact in raising attendance at the Phoenix meetings to more than 100 people monthly. The quality has gotten significantly better under his leadership. He has organized many speakers, including recruiting speakers from out of the area that have significantly developed the knowledge base of the community. Joaquin is a pen testing manager at Early Warning and he shares his professional knowledge to help us all become better in the practice of information security.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|[https://www.owasp.org/index.php/User:Brianglas Brian Glas]&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Brian has been paramount in 2 very strategic initiatives for OWASP. He is not only a Project Leader for the OWASP SAMM project but he has been instrumental in revamping the call for data and reorganizing the flagship OWASP Top Ten. Brian continues to support and speak about the benefits of supporting OWASP especially projects and participating in the Summit. Please consider Brian Glas as the Best Community Supporter for this year.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Evin Hernandez&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Evins focus on the core of the information security platform with Virtual Village has provided the global community with a place to experiment and leverage for testing... &amp;lt;nowiki&amp;gt;https://www.owasp.org/index.php/OWASP_Virtual_Village_Project&amp;lt;/nowiki&amp;gt;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Jeremy Long&lt;br /&gt;
|'''''Best Innovator''''' &lt;br /&gt;
&amp;quot;Considering how often projects have a great start and plateau, we should recognize the ongoing effort and dedication given to one of the Flagship projects in our community.&lt;br /&gt;
Jeremy Long has continued to not only maintain the Dependency Check project but develop and improve it each year.&lt;br /&gt;
This year he added Improvements in the core dependency-check platform in terms of code quality, achieved 100% for the CII Best Practices for dependency-check, continued to develop the ODC community with several contributors submitting PRs, and over the last several months he's been working on platform maturity and will be releasing 2.0.0 in the first half of July 2017.&lt;br /&gt;
After 2.0 is released he has planned work on Python support and expanding the tool by integrating additional data-sources such as Artifactory, Redhat Victim's, OSS-Index, etc.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''2nd Citation:''' &amp;quot;Jeremy has been an avid contributor/leader for the OWASP dependency-check project. Under his leadership the project has garnered substantial community support in terms of pull requests, improved code quality via Sonarcloud, Coverity, Codacy, and CII Best Practices. While the last six months have been primarily around code quality and bug fixes; these improvements are setting the dependency-check project up for major enhancements over the coming months!&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Daniel Miessler&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Daniel seems to be everywhere at once - despite have a full-time job, he is leading or co-leading several OWASP projects, has created ideas for groups out of thin air, and has performed work in much needed areas.&lt;br /&gt;
This year, Daniel has lead or co-lead the Internet of Things security project, completed an IoT: Medical Devices attack surface overview, and created the Game Security project.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Dhiraj Mishra&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&lt;br /&gt;
&amp;quot;Dhiraj is one of the top contributor in OWASP Cheat Sheet Project, which have security guidance in an easy read format, his contribution for SQL Injection WAF Bypass and XSS Evasion - OWASP, was mostly recommended and used by Cyber Security professional, dhiraj has contributed to Benchmark project by contributing SQLi/XSS fuzz vectors as initial contribution towards adding support for WAF/RASP scoring and many such projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Bernhard Mueller&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;During the last 18 months Bernhard has been spearheading the OWASP Mobile Testing Guide Project. He has invested several man-months of writing, editing, reviewing, rallying authors, and pushing the project into new directions. This also resulted in the novel agile book writing process and book production pipeline which enables OWASP to produce a professional tech book. The project has produced a security standard and early-release ebook, and is on track become one of OWASP's main flagship projects.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|Steve Springett&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Steve's work on dependency-track is fantastic - he's moved forward to address the next round of issues, with an innovative solution all companies can leverage.&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
|thc202&lt;br /&gt;
|'''''Best Innovator'''''&lt;br /&gt;
&amp;quot;Simon Bennets &amp;quot;wingman&amp;quot; in the ZAP project, by now even the top committer in the project! (&amp;lt;nowiki&amp;gt;https://github.com/zaproxy/zaproxy/graphs/contributors&amp;lt;/nowiki&amp;gt;) So &amp;quot;unsung of&amp;quot; that I do not even know his real name!&amp;quot;&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==Results==&lt;br /&gt;
Coming July 25, 2017&lt;br /&gt;
&lt;br /&gt;
==Sponsorship Opportunities==&lt;br /&gt;
The support from our sponsors, is what makes these awards truly successful!&lt;br /&gt;
&lt;br /&gt;
Sponsorships coming soon!&lt;br /&gt;
&lt;br /&gt;
==Communication==&lt;br /&gt;
# June 7, 2017 Email to the Leaders &amp;amp; Community list. Posted to the OWASP [https://owasp.blogspot.com/2017/06/nominations-are-now-being-accepted-for.html Blog]&lt;br /&gt;
# June 30, 2017 Email to the Leaders &amp;amp; Community list.&lt;br /&gt;
# July 5, 2017 Email to the Nominees&lt;br /&gt;
# July 5, 2017 Email to the Leaders &amp;amp; Community list, and Blog post announcing the nominees have been announced.&lt;br /&gt;
&lt;br /&gt;
=='''Past WASPY Awards'''==&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2016 2016]&amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2015 2015] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2014 2014] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2013 2013] &amp;lt;br&amp;gt;&lt;br /&gt;
[https://www.owasp.org/index.php/WASPY_Awards_2012 2012] &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=230694</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=230694"/>
				<updated>2017-06-16T02:05:56Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2017 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2017 will be a 2 day conference in Phoenix on September 29 &amp;amp; 30. Registration and CFP information can be found here:'http://www.cactuscon.com&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2017 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=230693</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=230693"/>
				<updated>2017-06-16T02:05:00Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2017 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2017 will be a 2 day conference in Phoenix on September 29 &amp;amp; 30. Registration and CFP information can be found here:'http://www.cactuscon.com&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2017 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=230692</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=230692"/>
				<updated>2017-06-16T02:03:40Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2017 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2017 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2017 will be a 2 day conference in Phoenix on September 29 &amp;amp; 30. Registration and CFP information can be found here:'http://www.cactuscon.com&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2017 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=230691</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=230691"/>
				<updated>2017-06-16T02:02:15Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2017 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
Welcome to the Phoenix Chapter! We are continuing to have meetings in 2017 and are always seeking new speakers. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2017 will be a 2 day conference in Phoenix on September 29 &amp;amp; 30. Registration and CFP information can be found here:'http://www.cactuscon.com&amp;lt;nowiki/&amp;gt;'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2017 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM-ish. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2017 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 12, 2017 (6:30PM-7:45PM) - Weaponizing Machine Learning: Humanity Was Overrated Anyway'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Dan Petro &amp;amp; Ben Morris'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.&lt;br /&gt;
&lt;br /&gt;
DeepHack can ruin your day without any prior knowledge of apps, databases… or really anything else. Using just one algorithm, it learns how to exploit multiple kinds of vulnerabilities, opening the door for a host of hacking artificial intelligence systems in the future.&lt;br /&gt;
&lt;br /&gt;
This is only the beginning of the end, though. AI-based hacking tools are emerging as a class of technology that pentesters have yet to fully explore. We guarantee that you’ll be either writing machine learning hacking tools next year, or desperately attempting to defend against them.&lt;br /&gt;
&lt;br /&gt;
No longer relegated just to the domain of evil geniuses, the inevitable AI dystopia is accessible to you today! So join us and we’ll demonstrate how you too can help usher in the destruction of humanity by building weaponized machine learning systems of your own… unless time travelers from the future don’t stop us first.&lt;br /&gt;
&lt;br /&gt;
'''About the Speakers''': &lt;br /&gt;
&lt;br /&gt;
'''Dan Petro''' is a Senior Security Associate at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and network penetration testing.Dan likes to hear himself talk, often resulting in conference presentations including several consecutive talks at Black Hat USA and DEF CON in addition to appearances at HOPE, BSides, and ToorCon. He is widely known for the tools he creates: the Rickmote Controller (a Chromecast-hacking device), Untwister (a tool used for breaking pseudorandom number generators) and SmashBot (a merciless Smash Bros noob-pwning machine). He also organizes Root the Box, a capture the flag security competition. Dan holds has a Master of Science in Computer Science from Arizona State University and still doesn’t regret it.&lt;br /&gt;
&lt;br /&gt;
'''Ben Morris''' is a Security Analyst at Bishop Fox, a consulting firm providing cybersecurity services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, network penetration testing, and red-teaming. Ben also enjoys performing drive-by pull requests on security tools and bumbling his way into vulnerabilities in widely used PHP and .NET frameworks and plugins. Ben has also contributed to Root the Box, a capture the flag security competition.&lt;br /&gt;
&lt;br /&gt;
'''June 22, 2017 (6:30PM-7:45PM) - Domo Arigato, Mr. Roboto: Security-Testing in the Real World'''&lt;br /&gt;
&lt;br /&gt;
'''Presenter: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;'''Topic''': Security testing is difficult, no matter who is doing it or how it is performed. Both the security and development industries still struggle to find reliable solutions to identify vulnerabilities in custom code, but sometimes make things harder than they should be.&lt;br /&gt;
&lt;br /&gt;
This talk will address the current limitations of security unit-testing applications with existing tools and various frameworks. It will introduce a generic framework for creating simple security unit-tests for any application. We will also cover review common strategies for building application security-specific unit-tests, including function identification, testing approaches, edge cases, regression testing, and payload generation. These techniques will be demonstrated in Java Spring and .Net MVC frameworks using intentionally-vulnerable applications and cover unit-testing, Test Driven Development (TDD) and Continuous Integration (CI) in security framework.&lt;br /&gt;
&lt;br /&gt;
'''About the Speaker''': Seth Law is an experienced Application Security Professional with over 15 years of experience in the computer security industry. During this time, Seth has worked within multiple disciplines in the security field, from software development to network protection, both as a manager and individual contributor. Seth has honed his application security skills using offensive and defensive techniques, including tool development. His understanding of the software development lifecycle allows him to speak as a developer and to equate security issues to development tasks. In his spare time, Seth revels in deep-level analysis of programming languages and inherent flaws.&lt;br /&gt;
&lt;br /&gt;
'''Feb 28, 2017 - Hands-On Introduction to Web Application Exploitation''' - BYO Laptop: Joaquin Fuentes &amp;amp; Early Warning Pentest Team as Mentors&lt;br /&gt;
&lt;br /&gt;
Abtract: This workshop is geared towards newbies and those who have heard about the OWASP Top 10, but have never actually exploited any of the vulnerabilities.  Let's move from theory to practical application, as we overcome the fear of the keyboard.  Joaquin Fuentes will provide a brief introduction to the the workshop and recommended resources, before letting you explore the hands-on challenges. This will be a CTF-style workshop, with progressively challenging exercises.  Prizes will be awarded for top performers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
'''Jan 28, 2016 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17, 2016 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12, 2016''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29, 2016 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07, 2016: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05, 2016 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30, 2016 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;http://www.google.com/corporate/halloffame.html&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;http://google-gruyere.appspot.com/&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;http://www.exploit-db.com/author/?a=628 &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
http://www.exploit-db.com/exploits/16103/ (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;http://www.exploit-db.com/exploits/15838/ (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=223555</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=223555"/>
				<updated>2016-11-21T01:44:32Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix on May 6,7. Registration and CFP information can be found here:'http://www.cactuscon.com'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Nov 30 (6:30PM-8:00PM): Jack Mannino'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Microservices Security - Challenges and Solutions    Speaker: Jack Mannino'''&lt;br /&gt;
 &lt;br /&gt;
'''Abstract:'''&lt;br /&gt;
Microservices offer a lot of benefits for deploying large-scale applications, but implementing a secure architecture that scales over time can be challenging. Services are highly decoupled from each other as well as producers and consumers of data moving throughout the architecture. Data contracts between services are often blurry, and data sharing between microservices require careful consideration around access patterns and boundaries between related services. New services come, new services go. Some are deployed to containers, some to servers, and some are serverless. Your developers, data scientists, and infrastructure team are all empowered to move quickly and ship new services. Your job is to make sure all of the above happens in a secure and sane way.&lt;br /&gt;
 &lt;br /&gt;
In this presentation, we will discuss the challenges with securing microservices and present solutions to make security a seamless and frictionless part of scaling your architecture. Using real-world examples of successes and failures while building a microservice architecture, we will discuss what translates well from monolithic design to microservices, and the bad habits you should leave behind. We will demonstrate how to build authentication into a microservice architecture and how to implement a granular authorization scheme that will work effectively as you introduce new services. At the end of this presentation, you’ll understand what separates microservices from traditional monolithic applications and understand the problem space from a secure architectural perspective.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Bio:''' Jack is the CEO at nVisium and focuses on building solutions to make security and education scale in fast-paced software development organizations. He has worked with large software development teams to guide secure software from conceptualization to production. In his spare time, he enjoys digging into new frameworks and writes most of his (good) code in Scala. He has spoken at most of the other major conferences people generally list in their bios, too. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=222060</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=222060"/>
				<updated>2016-10-04T05:35:04Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix on May 6,7. Registration and CFP information can be found here:'http://www.cactuscon.com'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=222059</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=222059"/>
				<updated>2016-10-04T05:34:00Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix on May 6,7. Registration and CFP information can be found here:'http://www.cactuscon.com'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''July 07: Dan “AltF4” Petro'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Reversing Video Games to Create an Unbeatable AI Player - Game over, man!'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
“Super Smash Bros: Melee.” - Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. That sweet rush of power you once knew as you beat all the kids on your block will be but a distant memory as SmashBot challenges you to a duel for your pride — live on stage. SmashBot is the Artificial Intelligence I created that plays the cult classic video game Smash Bros optimally. It can't be bargained with. It can't be reasoned with. It doesn't feel pity, remorse, or fear. This Raspberry Pi monster won’t stop until all your lives are gone. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming. When not used to create a killer doomsday machine, these same skills translate to hacking Internet of Things (IoT) devices, developing shellcode, and more. Forget about Internet ending zero-day releases and new exploit kits. Come on down and get wrecked at a beloved old video game. Line up and take your turn trying to beat the AI yourself, live on the projectors for everyone to see. When you lose though, don’t run home and go crying to yo Momma.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Dan is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development. Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team. Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm. Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Wed, Oct 05 (6:30PM-8:00PM): Raymond Tu'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''Everyone hates Robocalls: Why is it so hard to stop? Speaker: Raymond Tu'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
Today, the telephone network is rife with telephone spam, namely voice, voicemail, and SMS spam. Spam calls are significant annoyances for telephone users, unlike email spam, which can be ignored, spam calls demand immediate attention. Telephone spam is not only a significant annoyance, it also result in significant financial loss in the economy. According to complaint data collected by the FTC, Americans lost more than $8.6 billion due to fraud annually, and the vast majority of them (and still increasing) are due to phone communication. Despite various efforts that reduce telephone spam, scam and robocalls, complaints on illegal calls have been making record numbers in recent years. This situation is surprising, given the significant gains made in reducing the amount of email spam. This raises the question: are there any simple and effective solutions that could stop telephone spam? In this talk, we will cover the existing countermeasures and analyze why these countermeasures have so far failed at reducing the growth of telephone spam, followed by a discussion on what he believes to be the future direction of solving the telephone spam problem.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Raymond Tu is a PhD Student in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University, where he is advised by Dr. Adam Doupé. He was awarded a graduate fellowship award from Arizona State University and has recently published a paper at the IEEE Symposium on Security and Privacy (Oakland). His main research focus is in spam and scams in the telephony networks, and the goal is to develop simple, effective and deployable solutions in combating telephone spam, similar to what has been achieved in defenses against email spam. To know more information or to connect with Raymond, please visit: &lt;br /&gt;
&lt;br /&gt;
http://huahongtu.me&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=217905</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=217905"/>
				<updated>2016-06-14T04:33:36Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix on May 6,7. Registration and CFP information can be found here:'http://www.cactuscon.com'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
'''Mike McCambridge: Tunneling To Freedom'''&lt;br /&gt;
&lt;br /&gt;
How often have you heard phrases like 'walled-off,' 'no access,' or 'air gap?' In this talk I will explore a few unexpected and unintended ways computers can communicate with one another. Learn how to discover potential tunnels or covert channels in your environment, evaluate risk , and develop defensive strategies.&lt;br /&gt;
&lt;br /&gt;
Speaker Bio:&lt;br /&gt;
&lt;br /&gt;
Michael McCambridge is a Penetration Tester at Early Warning.  He entered the security field after graduate studies in Computer Science at the University of Arizona.  A mechanical engineer in a former life, Mike finds pentesting to be wildly more fun – almost as fun as Minecraft.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''June 29 (6:30PM-8:00PM): Adam Doupe - Everything You've Ever Wanted to Know About Black-Box Web Vulnerability Scanners (But Were Afraid to Ask)'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''ASU Campus - BYAC 110&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
30 E. 7th St., Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Please join us for our June meeting at ASU. Pizza will be provided. Make sure to account for time to find a parking spot http://www.asu.edu/map/interactive/?campus=tempe&amp;amp;building=BYAC&lt;br /&gt;
&lt;br /&gt;
Black-Box web vulnerability scanners, such as Acunetix, AppScan, and WebInspect, attempt to automatically find vulnerabilities in web applications. These tools promise to bring pentesting skills to the average developer, and they are frequently used as part of the pen testing process.&lt;br /&gt;
&lt;br /&gt;
However, despite their frequent usage, significant questions remain. How do these tools work? Are they effective at finding vulnerabilities? What research is being done to improve these tools? Can they handle modern client-side JavaScript web applications? In this talk, we'll cover all these questions and more!&lt;br /&gt;
&lt;br /&gt;
Bio:&lt;br /&gt;
&lt;br /&gt;
Adam Doupé is an Assistant Professor in the School of Computing, Informatics, and Decision Systems Engineering at Arizona State University. He was awarded the Fulton Schools of Engineering Best Teacher Award Top 5% for 2015 from Arizona State University. His main research focus is in the area of automated vulnerability analysis of web applications using static analysis and dynamic analysis. Prior to joining ASU in 2014, Adam completed his PhD at UC Santa Barbara, where he competed at DEFCON CTF for four years with team Shellfish.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=211597</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=211597"/>
				<updated>2016-03-22T20:14:56Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix on May 6,7. Registration and CFP information can be found here:'http://www.cactuscon.com'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''April 12''': Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=211596</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=211596"/>
				<updated>2016-03-22T19:56:05Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix on May 6,7. Registration and CFP information can be found here:'http://www.cactuscon.com'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
April 12: Mike McCambridge will be speaking at a joint ISSA/OWASP meeting.  See the ISSA page to register.  Attendance to the OWASP portion of the meeting is free: http://phoenix.issa.org/event-details/&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=208349</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=208349"/>
				<updated>2016-02-08T23:29:15Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix on May 6,7. Registration and CFP information can be found here:'http://www.cactuscon.com'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are announced depending on speaker's availability and are held 6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Mar 24: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=208348</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=208348"/>
				<updated>2016-02-08T23:28:17Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix on May 6,7. Registration and CFP information can be found here:'http://www.cactuscon.com'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Mar 24: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=208347</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=208347"/>
				<updated>2016-02-08T23:26:07Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Feb 17 (6:30PM-8:00PM): Jim Manico'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Mar 24: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=208346</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=208346"/>
				<updated>2016-02-08T23:25:04Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Feb 17: Jim Manico&lt;br /&gt;
&lt;br /&gt;
The Beatles once sang, &amp;quot;I've got to admit it's getting better, a little better all the time, because it can't get more worse&amp;quot; and that applies directly to the field application security. The successes in building security into common application development frameworks is remarkable and has, in some ways, made secure coding less of an effort to the developer. While much needs to be done in this area, there are many very positive examples of security characteristics built correctly into frameworks. This talk with bring the positive vibe to OWASP Phoenix and highlight that things really are getting better in AppSec - all time - if you look in the right places.&amp;quot;&lt;br /&gt;
&lt;br /&gt;
Jim Manico is the founder of Manicode Security where he trains software developers on secure coding and security engineering. He is also the founder of Brakeman Security, Inc. and is a investor/advisor for Signal Sciences. Jim is a frequent speaker on secure software practices and is a member of the JavaOne rockstar speaker community. Jim is also a Global Board Member for the OWASP foundation where he helps drive the strategic vision for the organization. He is the author of &amp;quot;Iron-Clad Java: Building Secure Web Applications&amp;quot; from McGraw-Hill. For more information, see &lt;br /&gt;
&lt;br /&gt;
http://www.linkedin.com/in/jmanico&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Mar 24: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=207623</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=207623"/>
				<updated>2016-01-28T23:29:46Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Feb 17: Jim Manico, Secure Coding&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Mar 24: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206905</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206905"/>
				<updated>2016-01-20T17:28:47Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30PM-8:00PM): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Feb 25: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206904</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206904"/>
				<updated>2016-01-20T17:28:03Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28 (6:30-8:00): Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Feb 25: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206903</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206903"/>
				<updated>2016-01-20T17:22:49Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Jan 28: Seth Law'''&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
'''Early Warning'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
'''DevOps and Security - A match made (and broken) in the cloud'''&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Feb 25: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206902</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206902"/>
				<updated>2016-01-20T17:21:49Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jan 28: Seth Law&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
Early Warning&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Ste 100&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
DevOps and Security - A match made (and broken) in the cloud&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Feb 25: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206900</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206900"/>
				<updated>2016-01-20T17:20:56Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jan 28: Seth Law&lt;br /&gt;
&lt;br /&gt;
Location:&lt;br /&gt;
Early Warning&lt;br /&gt;
16552 N 90th St&lt;br /&gt;
Ste 100&lt;br /&gt;
Scottsdale, AZ 85260&lt;br /&gt;
https://goo.gl/maps/R8X2RdD2zr22&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
DevOps and Security - A match made (and broken) in the cloud&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Feb 25: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206454</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206454"/>
				<updated>2016-01-15T03:07:10Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2016 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jan 28: Seth Law&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
DevOps and Security - A match made (and broken) in the cloud&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Feb 25: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206453</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206453"/>
				<updated>2016-01-15T03:05:37Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2015 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2016 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Jan 28: Seth Law&lt;br /&gt;
&lt;br /&gt;
Title:&lt;br /&gt;
DevOps and Security - A match made (and broken) in the cloud&lt;br /&gt;
 &lt;br /&gt;
Abstract:&lt;br /&gt;
DevOps is the new Agile, allowing organizations to move faster and deploy code quicker. Yet in the quest for continuous delivery, security can fall by the wayside, opening an organization up to data exposure and malicious exploitation. This talk will cover current security research into the technology behind DevOps, examples of failures, and how to prevent the same from happening in your organization. Technologies discussed will include AWS, Git, Hudson/Jenkins, and more.  In the end, the presentation should help attendees understand the risks involved in running a DevOps environment.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Feb 25: Mike McCambridge, Tunnelling and Data Exfiltration&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206452</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206452"/>
				<updated>2016-01-15T02:58:24Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;''Announcement: CactusCon 2016 will be a 2 day conference in Phoenix in May. Registration and CFP to be announced. 'https://m.facebook.com/CactusCon'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2016 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 8:00 PM. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2015 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206451</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=206451"/>
				<updated>2016-01-15T02:52:24Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* OWASP Phoenix -- */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We restarted chapter activity in 2015 and are excited about the continued community participation in 2016. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;'''Thanks everyone for supporting CactusCon, over 320 people attended!  OWASP Phoenix was a partner sponsor.'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2015 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 7:30 PM, for 1 hour. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2015 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:United_States]]&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=203137</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=203137"/>
				<updated>2015-11-06T02:16:01Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2015 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We have restarted chapter activity in 2015 and are excited about community participation. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;'''Thanks everyone for supporting CactusCon, over 320 people attended!  OWASP Phoenix was a partner sponsor.'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2015 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 7:30 PM, for 1 hour. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2015 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TBD&amp;lt;br&amp;gt;&lt;br /&gt;
Reach out to Joaquin.Fuentes@owasp.org if you would like to speak!&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=203136</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=203136"/>
				<updated>2015-11-06T02:15:00Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* Previous Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We have restarted chapter activity in 2015 and are excited about community participation. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;'''Thanks everyone for supporting CactusCon, over 320 people attended!  OWASP Phoenix was a partner sponsor.'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2015 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 7:30 PM, for 1 hour. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2015 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Time: 6:30 - 7:30 (arrive about 15 minutes early) &amp;lt;br&amp;gt;&lt;br /&gt;
Location: Early Warning 16552 N 90th St Ste 100, Scottsdale, AZ 85260 &amp;lt;br&amp;gt;&lt;br /&gt;
Room: Checkin with Security Officer, picture ID required&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
&lt;br /&gt;
For first timers, please make sure to arrive at least 15 minutes early due to the required badging registration. A picture ID is required to enter the building.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:RevEngMal.pptx]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:RevEngMal.pptx&amp;diff=203135</id>
		<title>File:RevEngMal.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:RevEngMal.pptx&amp;diff=203135"/>
				<updated>2015-11-06T02:05:49Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: Joe Giron's Presentation&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Joe Giron's Presentation&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Presentation_RevEngMal.jpg&amp;diff=203134</id>
		<title>File:Presentation RevEngMal.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Presentation_RevEngMal.jpg&amp;diff=203134"/>
				<updated>2015-11-06T02:01:38Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=203133</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=203133"/>
				<updated>2015-11-06T02:00:18Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* Previous Meetings */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We have restarted chapter activity in 2015 and are excited about community participation. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;'''Thanks everyone for supporting CactusCon, over 320 people attended!  OWASP Phoenix was a partner sponsor.'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2015 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 7:30 PM, for 1 hour. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2015 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Time: 6:30 - 7:30 (arrive about 15 minutes early) &amp;lt;br&amp;gt;&lt;br /&gt;
Location: Early Warning 16552 N 90th St Ste 100, Scottsdale, AZ 85260 &amp;lt;br&amp;gt;&lt;br /&gt;
Room: Checkin with Security Officer, picture ID required&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
&lt;br /&gt;
For first timers, please make sure to arrive at least 15 minutes early due to the required badging registration. A picture ID is required to enter the building.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
[[File:Presentation.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Presentation.pptx&amp;diff=202830</id>
		<title>File:Presentation.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Presentation.pptx&amp;diff=202830"/>
				<updated>2015-10-29T00:09:46Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: Nate's Presentation on Hacking Email Systems&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Nate's Presentation on Hacking Email Systems&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=202829</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=202829"/>
				<updated>2015-10-29T00:06:24Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We have restarted chapter activity in 2015 and are excited about community participation. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;'''Thanks everyone for supporting CactusCon, over 320 people attended!  OWASP Phoenix was a partner sponsor.'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2015 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 7:30 PM, for 1 hour. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2015 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Time: 6:30 - 7:30 (arrive about 15 minutes early) &amp;lt;br&amp;gt;&lt;br /&gt;
Location: Early Warning 16552 N 90th St Ste 100, Scottsdale, AZ 85260 &amp;lt;br&amp;gt;&lt;br /&gt;
Room: Checkin with Security Officer, picture ID required&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
&lt;br /&gt;
For first timers, please make sure to arrive at least 15 minutes early due to the required badging registration. A picture ID is required to enter the building.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[File:Presentation.pptx]]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=202257</id>
		<title>Phoenix</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix&amp;diff=202257"/>
				<updated>2015-10-19T05:56:43Z</updated>
		
		<summary type="html">&lt;p&gt;Fuentes.joaquin: /* 2015 Meetings Calendar */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Phoenix|extra=The chapter leader is [mailto:joaquin.fuentes@owasp.org Joaquin Fuentes] &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-phoenix|emailarchives=http://lists.owasp.org/pipermail/owasp-phoenix}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== OWASP Phoenix --  ==&lt;br /&gt;
&lt;br /&gt;
We have restarted chapter activity in 2015 and are excited about community participation. Join the mailing list for meeting announcements. &amp;lt;br&amp;gt;&lt;br /&gt;
Please also join the Meetup.com group and be sure to RSVP to chapter meetings.  Your RSVPs allow us to ensure we reserve the proper-sized meeting space.&amp;lt;br&amp;gt;&lt;br /&gt;
http://www.meetup.com/owasp-phoenix&lt;br /&gt;
&lt;br /&gt;
== Local News  ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;font color=&amp;quot;green&amp;quot;&amp;gt;'''Thanks everyone for supporting CactusCon, over 320 people attended!  OWASP Phoenix was a partner sponsor.'''&amp;lt;/font&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
OWASP Phoenix 2015 Meetings &lt;br /&gt;
&lt;br /&gt;
Meetings are typically held on the first Tuesday, Wednesday, or Thursday of the month (depending on speaker's availability),  6:30 PM - 7:30 PM, for 1 hour. Check this page or join the meetup group at http://www.meetup.com/OWASP-Phoenix for updates.&lt;br /&gt;
&lt;br /&gt;
Afterward, we'll head to a local watering hole for socializing and fun.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Every now and then we may change the venue or time in order to get participation from various parts of the community.&lt;br /&gt;
&lt;br /&gt;
== 2015 Meetings Calendar  ==&lt;br /&gt;
&lt;br /&gt;
This calendar will  be updated as meetings are announced.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Thursday, Nov 05&amp;lt;br&amp;gt;&lt;br /&gt;
Time: 6:30 - 7:30 (arrive about 15 minutes early) &amp;lt;br&amp;gt;&lt;br /&gt;
Location: Early Warning 16552 N 90th St Ste 100, Scottsdale, AZ 85260 &amp;lt;br&amp;gt;&lt;br /&gt;
Room: Checkin with Security Officer, picture ID required&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Reverse Engineering Malware for Newbies''' &amp;lt;br&amp;gt;Presenter(s): '''Joe Giron''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we're going to cover basic malware analysis, unpacking 101, dynamic analysis, memory analysis, where to get malware, basic x86/64 ASM, tools of the trade, setting up an environment, intro to the debugger, basic debugger usage, and reporting.&lt;br /&gt;
&lt;br /&gt;
About the presenter: Joe Giron is a 29 year old security enthusiast and Phoenix native. When not hacking the planet, he can be found at home writing video game cheats or working on his truck. He also enjoys candle lit dinners and long walks on the beach.&lt;br /&gt;
&lt;br /&gt;
For first timers, please make sure to arrive at least 15 minutes early due to the required badging registration. A picture ID is required to enter the building.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Resources  ==&lt;br /&gt;
&lt;br /&gt;
'''Archived pages on [[Phoenix/Tools]] and [[Phoenix/ToolsProfile]]''' &lt;br /&gt;
&lt;br /&gt;
This chapter is dedicated to bringing together local businesses, students, and web and security enthusiasts in order to discuss current events, trends, tools, and offensive/defensive techniques related to web application security. We currently hold meetings every other month, typically with one or two speakers at each meeting.&lt;br /&gt;
&lt;br /&gt;
== What talks would you like to see?  ==&lt;br /&gt;
&lt;br /&gt;
'''Please Update''' &amp;lt;!-- I tried to capture items that people mentioned in the meeting, &lt;br /&gt;
but please update with anything else you want to see--&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Previous Meetings  ==&lt;br /&gt;
Wednesday, Oct 14&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Corporate Em@il Systems''' &amp;lt;br&amp;gt;Presenter(s): '''Nate Power''' &amp;lt;br&amp;gt;&lt;br /&gt;
In this talk we will discuss current email system attack vectors and how these systems can be abused and leveraged to break into corporate networks.  A penetration testing methodology will be discussed and technical demonstrations of attacks will be shown.  Phases of this methodology include information gathering, network mapping, vulnerability identification, penetration, privilege escalation, and maintaining access.  Methods for organizations to better protect systems will also be discussed.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Nate Power is a Senior Security Penetration Tester working for Rapid7 Global Services.  Nate is an expert at Web Application testing and seeking out vulnerabilities in common frameworks.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Tuesday, July 07&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''Hacking Smart Safes: On the &amp;quot;Brink&amp;quot; of a Robbery''' &amp;lt;br&amp;gt;Presenter(s): '''Dan “AltF4” Petro, Oscar Salazar''' &amp;lt;br&amp;gt;&lt;br /&gt;
Have you ever wanted to crack open a safe full of cash with nothing but a USB stick? Now you can!&amp;lt;br&amp;gt;&lt;br /&gt;
The Brink’s CompuSafe cash management product line provides a “smart safe as a service” solution to major retailers and fast food franchises. They offer end-to-end management of your cash, transporting it safely from your storefront safe to your bank via armored car.&amp;lt;br&amp;gt;&lt;br /&gt;
During this talk, we’ll uncover a major flaw in the Brink’s CompuSafe and demonstrate how to crack one open in seconds flat. All you need is a USB stick and a large bag to hold all of the cash. We’ll discuss how to remotely takeover the safe with full administrator privileges, and show how to enumerate a target list of other major Brink’s CompuSafe customers (exposed via configuration files stored right on the safe).&amp;lt;br&amp;gt;&lt;br /&gt;
At any given time, up to $240,000 can be sitting in each of the 14,000 Brink’s CompuSafe smart safes currently deployed across the United States - potentially billions of dollars just waiting to be stolen.&amp;lt;br&amp;gt;&lt;br /&gt;
We will also release a USB Rubber Ducky script to automate the whole attack, acting as a skeleton key that can open any Brink’s safe. Plug and plunder!&amp;lt;br&amp;gt;&lt;br /&gt;
So come ready to engage us as we explore these tools and more in this DEMO rich presentation. And don’t forget to call Kenny Loggins… because this presentation is your highway to the Danger Zone…&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Dan Petro is a Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing and secure development.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan has presented at numerous conferences, including DEFCON, BlackHat, HOPE, and BSides, and is the founding member of the Pi Backwards CTF team.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Dan served as Lead Software Engineer for a security contracting firm.&amp;lt;br&amp;gt;&lt;br /&gt;
Dan holds a Bachelor of Science from Arizona State University with a major in Computer Science, as well as a Master’s Degree in Computer Science from Arizona State University.&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar Salazar is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm providing IT security services to the Fortune 500, global financial institutions, and high-tech startups. In this role, he focuses on application penetration testing, source code review, and secure software design.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar has presented at RSA, Bsides, and Adobe’s annual private Security Summit conference.&amp;lt;br&amp;gt;&lt;br /&gt;
Prior to joining Bishop Fox, Oscar served as a web security research engineer at Hewlett-Packard’s Application Security Center where he designed and developed security checks for the WebInspect web application security scanner. In addition, his research involved developing more effective methods of scanning Web 2.0 applications.&amp;lt;br&amp;gt;&lt;br /&gt;
Oscar holds a Bachelor of Science from the Georgia Institute of Technology with a major in Computer Science and a focus on Networking and Security.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;June 09, 2015&amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''If you like it then you shouldn’t put a ring3 on it''' &amp;lt;br&amp;gt;Presenter: '''Andrew Wilson''' &amp;lt;br&amp;gt;&lt;br /&gt;
Web applications are a primary means to breaching a company’s external network. It is a high-value goal for both malicious actors and security professionals to gain this valuable foothold. But how do you get from mere web application vulnerabilities to the compromise of a server? Common testing guidelines provide you a check list of items to test for, but very few show you how to utilize vulnerabilities to achieve testing goals.&lt;br /&gt;
&lt;br /&gt;
Everyone knows that vulnerabilities have different levels of risk; But, what few talk about is the utility provided by vulnerabilities and how they can be used to achieve goals. Although some vulnerabilities are useful to note and impactful to a client, during a time gaped and scoped engagement they may not be able to be fully utilized. However, there are a handful of key direct vulnerabilities that can be leveraged to result in a compromise. These vulnerabilities, along with how to find them and how to leverage them for our needs, will be reviewed during this talk. Additionally, common attack strategies will be reviewed that can help a focus time and energies to maximize efforts in web server compromises. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Andrew Wilson&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew Wilson is a Senior Security Associate at Bishop Fox (formerly Stach &amp;amp; Liu), a security consulting firm. In this role, he focuses on application penetration testing, source code review, and secure application development.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Andrew has presented at DEF CON, BSides, and AppSec. In addition to that, Andrew is the founder and lead organizer of CactusCon. He has been a guest on the PaulDotCom podcast, and his personal research and writing has been cited numerous times by OWASP. Andrew is recognized by Microsoft as an expert in application security, having been selected as one of only sixteen Developer Security MVPs in the world.&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
May 05, 2015 &amp;lt;br&amp;gt;&lt;br /&gt;
Title: '''iOS App Attack and Defense (OWASP Mobile Top 10 Edition)''' Presenter: '''Seth Law''' &amp;lt;br&amp;gt;&lt;br /&gt;
Mobile apps are a fixture in today's digital world. Recent years have seen a explosion of apps in all areas of our lives, including health care, banking, social networking, and gaming. Learn about the OWASP Mobile Top 10 Risks and how to find, attack, and fix these flaws in today's app. Explore common mobile app vulnerabilities hands-on (or just follow along) through popular iOS App Store apps, as well as the new open-source, intentionally vulnerable Swift iOS application, Swift.nV (https://github.com/nVisium/Swift.nV). &amp;lt;br&amp;gt; &amp;lt;br&amp;gt;&lt;br /&gt;
Bio: Seth Law is the Director of Research &amp;amp; Development at nVisium and wrangles the research efforts into all areas of application security. An experienced Application Security Professional with years of security experience, Seth has worked in multiple disciplines, from software development to network protection, as a manager, contributor, and speaker. Seth explores the world of application security via @sethlaw.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Nick Hitchcock  '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This talk will take you from start to finish in a targeted social engineering attack. Using customized SE skills coupled with easy to use software tools, you will understand how real world attackers are infiltrating large organizations. Instead of bringing out “theoretical” scenarios, real world penetration testing examples will be discussed and demonstrated.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO at http://www.linkedin.com/in/nickhitchcock&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Steve Springett - - 'Introduction to OWASP Dependency-Check' '''&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Does your application have dependencies on 3rd party libraries? Do you know if those same libraries have published CVEs? Dependency-Check, an OWASP project, can help by providing identification and monitoring of application dependencies. The core engine can scan the libraries and will create an inventory of all the dependent libraries and whether or not there are any published CVEs. This talk will be provide an introduction to Dependency-Check.&lt;br /&gt;
Bio:&lt;br /&gt;
Steve Springett is an application security engineer at Axway. As part of the Product Security Group, he provides direction, best practices, education and tools to software development teams around the world. Steve has a software engineering background and is a contributor to OWASP Dependency-Check.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
'''Title: Top Ten Web Defenses'''&amp;lt;br&amp;gt;&lt;br /&gt;
We cannot “firewall” or “patch” our way to secure websites. In the past,&lt;br /&gt;
security professionals thought firewalls, Secure Sockets Layer (SSL),&lt;br /&gt;
patching, and privacy policies were enough. Today, however, these&lt;br /&gt;
methods are outdated and ineffective, as attacks on prominent,&lt;br /&gt;
well-protected websites are occurring every day. Most every organization&lt;br /&gt;
in the world have something in common – they have had websites&lt;br /&gt;
compromised in some way. No company or industry is immune. Programmers&lt;br /&gt;
need to learn to build websites differently. This talk will review the&lt;br /&gt;
top coding techniques developers need to master in order to build a&lt;br /&gt;
low-risk, high-security web application.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
BIO: Jim Manico is the VP of Security Architecture for WhiteHat&lt;br /&gt;
Security, a web security firm. He authors and delivers developer&lt;br /&gt;
security awareness training for WhiteHat Security and has a background&lt;br /&gt;
building software as a developer and architect for over 20 years. Jim is&lt;br /&gt;
also a global board member for the OWASP foundation where he helps drive&lt;br /&gt;
the strategic vision for the organization. He manages and participates&lt;br /&gt;
in several OWASP projects, including the OWASP cheat sheet series and&lt;br /&gt;
several additional secure coding projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
June 4, 2013 &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/d/d5/About_OWASP.pdf About OWASP]'''&amp;lt;br&amp;gt; &lt;br /&gt;
'''[http://www.owasp.org/images/3/38/AppSensor.pdf AppSensor - The future of Application Security], [[user:Dennis_Groves|Dennis Groves]]''' &amp;lt;br&amp;gt;&lt;br /&gt;
'''[http://www.owasp.org/images/f/fb/OWASP_GLOBAL_PROJECTS.pdf OWASP Projects], [[user:Samantha_Groves|Samantha Groves]], Global OWASP project manager.''' &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Dennis Groves is the co-founder of OWASP. He is a well known thought leader in application security who's work focuses on multidisciplinary approaches to information security risk management. He holds an MSc in Information Security from Royal Holloway, University of London. He is currently an expert for the UK mirror of ISO subcommittee 27, WG4.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Samantha Groves who is the Global OWASP project manager to speak briefly about the OWASP projects. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''MS SQL Injection - Start to Finish''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
This presentation will be a live hacking session demonstrating reconnaissance, identification, and exploitation of SQL injection with Microsoft SQL Server as the back end database.  SQL injection will be performed from start to finish, showing various techniques for obtaining data, and even fully compromising servers.  Both basic and advanced exploitation techniques will be explored.&lt;br /&gt;
&lt;br /&gt;
Scott White is a Principal Security Consultant for Cleveland-based TrustedSec.  He has presented to organizations such as OWASP, ISSA, ISACA, FBI's Infragard, and others.  He has also spoken at Defcon, and has been called upon by organizations such as the FBI and Secret Service as a subject matter expert.  He is the technical reviewer for the popular book, &amp;quot;Metasploit: The Penetration Tester's Guide&amp;quot;.  He holds a bachelors degree in Computer Science and a master's degree in Network Security.  He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private sectors with clients in both government and commercial spaces.  His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and web application security training.  With over 10 years of programming experience coupled with offensive security testing, he has a thorough web application security understanding from both developer and attacker perspectives.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Dan Cornell, Using ThreadFix To Manage Application Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Dan Cornell '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
ThreadFix is an open source software vulnerability aggregation and management system that reduces the time it takes to fix software vulnerabilities. It imports the results from dynamic, static and manual testing to provide a centralized view of software security defects across development teams and applications. The system allows organizations to correlate testing results and streamline software remediation efforts by simplifying feeds to software issue trackers. This presentation will walk through the major functionality in ThreadFix and describe several common use cases such as merging the results of multiple open source and commercial scanning tools and services. It will also demonstrate how ThreadFix can be used to track the results of scanning over time and gauge the effectiveness of different scanning techniques and technologies. Finally it will provide examples of how tracking assurance activities across an organization’s application portfolio can help the organization optimize remediation activities to best address risks associated with vulnerable software.&lt;br /&gt;
&lt;br /&gt;
Dan Cornell has over twelve years of experience architecting and developing web-based software systems. He leads Denim Group's security research team in investigating the application of secure coding and development techniques to improve web-based software development methodologies.&lt;br /&gt;
&lt;br /&gt;
Dan was the founding coordinator and chairman for the Java Users Group of San Antonio (JUGSA) and currently serves as the OWASP San Antonio chapter leader, member of the OWASP Global Membership Committee and co-lead of the OWASP Open Review Project. Dan has spoken at such international conferences as ROOTs in Norway and OWASP EU Summit in Portugal.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2013''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda will be presenting on &amp;quot;Standard Android and iOS Tools for 2013&amp;quot; This is a follow-up to his 2012 talk.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Content Discovery and Link Extraction for Application Security Testing''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Andre Gironda, HP, will be presenting on &amp;quot;Content Discovery and Link Extraction for Application Security Testing&amp;quot;. The talk will be focused on how to discover content the right way and make decisions before actual testing begins, as well as how to adjust needs during a on-going test. Most of the discussion will be tool agnostic, but it will help attendees if they have some prior experience with tools such as OWASP DirBuster or a commercial-grade crawler such as Netsparker Community Edition.&lt;br /&gt;
&lt;br /&gt;
Andre Gironda is a mobile application security risk consultant for HP Fortify who lives in Tempe, AZ &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Not the end of XSS''' &lt;br /&gt;
&lt;br /&gt;
'''Michael Brooks '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
XSS is by no means a solved problem. There is no silver bullet, function call or technology that makes you absolutely immune. This talk is focusing on bypassing Anti-XSS filters found in browsers as well as bypassing Content Security Policy (CSP) restrictions. This talk covers how these technologies are used to protect a web application and how they can be abused by an attacker.&lt;br /&gt;
&lt;br /&gt;
Michael Brooks&lt;br /&gt;
&lt;br /&gt;
Michael Brooks was in the top 1% of earners in the Google bug bounty program. He has written exploits for software you have probably used, patches have been written and we are all safer for it. A perfectly secure system can never be accomplished, test everything, trust nothing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''&amp;quot;Cool&amp;quot; Vulnerabilities''' &lt;br /&gt;
&lt;br /&gt;
'''Lonnie Benavides '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Web application management software is often overlooked and can contain critical vulnerabilities.  This talk will focus on four different publically known vulnerabilities within Adobe Cold Fusion.  Exploitation of these issues results in a complete compromise of the underlying web server.  Live demonstrations will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lonnie Benavides is a penetration tester and the lead of the Boeing Red Team.  Lonnie has been pen testing since 2003 when he joined an Air Force Red Team based out of McChord Air Force Base in Washington State.  He has taken over military bases, aircraft, and banks.  Lonnie and his family relocated from Seattle to Phoenix in February.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Sweet Pickles''' &lt;br /&gt;
&lt;br /&gt;
'''Chase Schultz '''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Sweet Pickles is inspired by a talk presented at Blackhat by Marco Salverio about practical pickle exploitation. Sweet pickles aims to address some of the concerns presented by Marco in his Sour Pickles talk. Using strong cryptography methods Sweet Pickles attempts to address the problem of confidentiality and authenticity of a python pickle while in transit. Sweet pickles utilizes Advaced Encryption Standard(AES) and Elliptic Curve Cryptography(ECC) to help secure Python's Serialized Objects(Pickles). Sweet pickles was first presented at the International Cyber Defense Workshop hosted by the Department of Defense by Chase. This presentation will be an elaboration on the research Chase has done on python pickles and his work to secure them.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio: Chase Schultz is currently a student at the University of Advancing Technology. He is majoring in Network Security and hopes to finish his degree in December of 2021(End of the world and all that aside…) Chase enjoy's application security and hunting bugs in software. He's spent time working for Stach &amp;amp; Liu as a web application penetration tester and also leads the [Buffer]Overflow Club at UAT. He developed Sweet pickles as a project in his free time to address the problems presented at Blackhat 2011 in the Sour Pickles talk. He is fluent in Python, C/C++, Assembly and random shit. Beyond playing with Python, Chase enjoys reverse engineering, and general software exploitation. Also enjoyed are Andre's random cocktails and IPA's. &lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Standard Android and iOS Tools for 2012''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; This will be a talk that discusses the baseline toolchains around&lt;br /&gt;
Android and iOS applications, whether trying to gain insight into&lt;br /&gt;
in-app activities, OS activities, IPC, as well as standard networking&lt;br /&gt;
protocols for both static and runtime.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Andre Gironda is a mobile application security risk consultant for HP&lt;br /&gt;
Fortify who lives in Tempe, AZ&lt;br /&gt;
&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Application Security: More Than Just Secure Coding Practices''' &lt;br /&gt;
&lt;br /&gt;
'''Scott White'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt; From a penetration tester's perspective, this presentation will examine a holistic approach to managing application security since attack vectors are not adequately mitigated using secure coding practices and traditional code reviews. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; Scott is a Senior Information Security Engineer at Diebold, Inc., holding a bachelors degree in computer science, a master's degree in network security, and is well-respected in the information security industry. He manages the global application security process ensuring that new and existing applications conform to industry and secure coding best practices. Additionally, he heads up offensive security efforts within Diebold, continually testing its systems and associates through penetration tests, product reviews, and social engineering exercises. He has held various past positions in support, system administration, web development, penetration testing, and application security for both public and private organizations servicing clients in the government and commercial spaces. His experience includes performing web application security assessments, internal, external, and physical penetration tests, source code reviews, social engineering, and developer training. With over 5 years working directly with information security and over 10 years programming experience, he has a thorough web application security understanding from both developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert. He is the technical editor for the popular book, &amp;quot;Metasploit The Penetration Tester's Guide&amp;quot;.&amp;lt;br&amp;gt;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''wxFramework''' '''(Web Exploitation Framework)'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Ken Johnson'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The project’s goal is to assist penetration testers in exploiting web application and web service weaknesses. Because exploitation of applications is rarely point and click and usually requires multiple steps, network exploitation frameworks often fall short of the goal. The framework is intended to assist attackers along their exploitation journey. During this talk we will preview the new graphical interface for the first time and demonstrate how it changes or enhances the reasons you may wish to try wXf. &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
Ken Johnson is a Senior Application Security Consultant performing source code analysis and web application penetration testing. Ken is the primary developer of the Web Exploitation Framework (wXf) and contributes to various open source application security projects. He has spoken at AppSec DC, OWASP NoVA, Northern Virginia Hackers Association and is a contributor to the Attack Research team.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''2011 Appsec Tools State-of-the-Art''' &lt;br /&gt;
&lt;br /&gt;
'''Andre Gironda''' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Abstract:&amp;lt;br&amp;gt;Every tool you should leverage during an app pen-test or secure code&amp;lt;br&amp;gt;review will be discussed. The two best web proxies, Burp Pro&amp;lt;br&amp;gt;(@portswigger) and Fiddler (@ericlaw) will be demonstrated along with&amp;lt;br&amp;gt;the two best crawlers from @netsparker and WebInspect. The results&amp;lt;br&amp;gt;from @sectooladdict will be discussed and the analysis demonstrated on&amp;lt;br&amp;gt;@owaspbwa. Additional topics will be discussed, such as executive&amp;lt;br&amp;gt;management reporting using dradisframework.org by way of imports from&amp;lt;br&amp;gt;@w3af. There will also be topics for application developers, such as&amp;lt;br&amp;gt;the new OWASP Data Exchange Format Project, as well as using CAT.NET,&amp;lt;br&amp;gt;RIPS, LAPSE+, and Fortify to go from vulnerable sources to runtime&amp;lt;br&amp;gt;analysis to full exploitation. Even esoteric tools from long-ago that&amp;lt;br&amp;gt;have held their value will be discussed and potentially demonstrated&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
BIO:&amp;lt;br&amp;gt;Andre works for the HP Application Security Center (ASC) doing&amp;lt;br&amp;gt;application penetration-testing, secure code review, and reverse&amp;lt;br&amp;gt;engineering. He has 9 years of direct experience with application&amp;lt;br&amp;gt;security topics, has been using Burp Suite on pen-tests since early&amp;lt;br&amp;gt;2005, and runs his own tool benchmarks at home in Tempe, AZ.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Andrew Wilson &amp;amp;amp; Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
'''Traps of Gold'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Andrew Wilson is a Security Consultant at Trustwave. He is a member of Trustwave's SpiderLabs - the advanced security team focused on penetration testing, incident response, and application security. He has over 9 years experience building and securing software for a variety of companies. Andrew specializes in application security assessment, penetration testing, threat modeling and secure development life cycle. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Obfuscating Search Queries with Hayst.ac''' &lt;br /&gt;
&lt;br /&gt;
'''David Huerta''' &lt;br /&gt;
&lt;br /&gt;
Hayst.ac, is a browser userscript to obfuscate search queries with machine-generated queries with the goal to be as close to indistinguishable from the human generated ones as possible. This is ultimately to discourage the use of search histories as a source of user profiling. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;After arriving in Arizona from the posh, cosmopolitan enclave of southeastern Idaho, David founded the DeVry Linux User Group (DeLUG) in 2003, an originally student organization that drew members and activities from the greater West Valley Free software community, including students at GCC and ASU West. He also serves on the board of directors for HeatSync Labs, a hackerspace in Chandler. &lt;br /&gt;
&lt;br /&gt;
'''OWASP O2 Platform'''&amp;lt;br&amp;gt;'''Dinis Cruz''' &lt;br /&gt;
&lt;br /&gt;
The O2 Platform is focused on automating application security knowledge and workflows. It is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code-driven application security reviews (blackbox + whitebox). In addition to the manual findings created/discovered by security consultants, the OWASP O2 Platform allows the easy consumption of results from multiple OWASP projects and commercial scanning tools. This allows security consultants to find, exploit and automate (via Unit Tests) security vulnerabilities usually dismissed by the community as impossible to find/recreate. More importantly, it provides security consultants a mechanism to: (a) &amp;quot;talk&amp;quot; with developers (via UnitTest), (b) give developers a way to replicate + &amp;quot;check if it's fixed&amp;quot; the vulnerabilities reported and (c) engage in a two-way conversion on the best way to fix/remediate those vulnerabilities. For more details see https://www.owasp.org/index.php/OWASP_O2_Platform, to download binary or source goto http://code.google.com/p/o2platform/downloads/list &lt;br /&gt;
&lt;br /&gt;
Bio&amp;lt;br&amp;gt;Dinis Cruz is a Security Consultant based in London (UK) and specialized in: ASP.NET/J2EE Application Security, Application Security audits and .NET Security Curriculum Development.&amp;lt;br&amp;gt;For the past couple years Dinis has focused on the field of Static Source Code Analysis and Dynamic Website Assessments (aka penetration testing), and is the main developer of the OWASP O2 Platform which is an Open Source project that is focused on 'Automating Security Consultants Knowledge/Workflows' and 'Allowing non-security experts to access and consume Security Knowledge'. Dinis is currently focused on making the O2 Platform the industry standard for consuming, instrumenting and data-sharing between: the multiple WebAppSec tools, the Security consultants and the final users (from management to developers).&amp;lt;br&amp;gt;(https://www.owasp.org/index.php/User:Dinis.cruz) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Improving your Fu &amp;amp;nbsp;'''-&amp;amp;nbsp;'''Andrew Wilson''' &lt;br /&gt;
&lt;br /&gt;
Delivering high quality results is the goal and earmark of any serious security practitioner. Professional penetration testing requires a set of reliable skills that will enable him/her to deliver consistently. Tools simply aren't enough. This talk outlines 10 of the more important disciplines and practices you can do to build or grow that solid foundation. &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Exploitation Redux and Bug Bounties &amp;amp;nbsp;-&amp;amp;nbsp;Michael Brooks''' &lt;br /&gt;
&lt;br /&gt;
Talk covered some of the recent vulnerabilities affecting Google and Mozilla, highlights such exploits as exploitation by email. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;List of bounty winners and a lot of blog links:&amp;lt;br&amp;gt;[http://www.google.com/corporate/halloffame.html http://www.google.com/corporate/halloffame.html]&amp;lt;br&amp;gt;Interesting SMTP based XSS&amp;lt;br&amp;gt;[http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/ http://spareclockcycles.org/2010/12/14/gmail-google-chrome-xss-vulnerability/]&amp;lt;br&amp;gt;XSS via event handlers:&amp;lt;br&amp;gt;[http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google http://adblockplus.org/blog/finding-security-issues-in-a-website-or-how-to-get-paid-by-google]&amp;lt;br&amp;gt;Good examples of strange XSS:&amp;lt;br&amp;gt;[http://google-gruyere.appspot.com/ http://google-gruyere.appspot.com/]&amp;lt;br&amp;gt;My Exploits (Including the Majordomo 2 Directory Traversal Vulnerability)&amp;lt;br&amp;gt;[http://www.exploit-db.com/author/?a=628 http://www.exploit-db.com/author/?a=628] &lt;br /&gt;
&lt;br /&gt;
Bio:&amp;lt;br&amp;gt;Michael Brooks is on the Google Security Hall Of Fame. He works for the security company Sitewatch. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''SharePoint Hacking - Advanced SharePoint Security Tools and Tips &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp;-Francis Brown''' &lt;br /&gt;
&lt;br /&gt;
[http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/ http://www.bishopfox.com/resources/tools/sharepoint-hacking-diggity/] &lt;br /&gt;
&lt;br /&gt;
Microsoft SharePoint products and technologies continue to grow in popularity and have become the core foundation upon which many organizations have built their web presence. Unfortunately, guidance concerning common SharePoint security issues tends to be overly complex and often misunderstood. Ultimately this results in insecurely configured and deployed SharePoint instances in production environments. &lt;br /&gt;
&lt;br /&gt;
This demonstration rich presentation will cover our newly released SharePoint hacking tools and techniques that security professionals can easily use to identify and exploit common insecure configurations in SharePoint applications. Some of the areas we’ll attempt to tackle are:&amp;lt;br&amp;gt;• Identifying vulnerable SharePoint applications using public search engines such as Google and Bing&amp;lt;br&amp;gt;• Gaining unauthorized access to SharePoint administrative web interfaces&amp;lt;br&amp;gt;• Exploiting holes in SharePoint site user permissions and inheritance&amp;lt;br&amp;gt;• Illustrating the dangers of granting excessive access to normal user accounts&amp;lt;br&amp;gt;• Pillaging Active Directory via insecure SharePoint services&amp;lt;br&amp;gt;• Attacking 3rd party plugins/code within SharePoint&amp;lt;br&amp;gt;• And much more… &lt;br /&gt;
&lt;br /&gt;
Bio: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Appsec Design Reviews Reloaded -&amp;amp;nbsp;Andre Gironda&amp;lt;br&amp;gt;'''The best place to start in the software lifecycle is during the design phase.&amp;lt;br&amp;gt;Workflow tools exist for SDL processes, build servers,&amp;lt;br&amp;gt;penetration-testing activities, and many other application security&amp;lt;br&amp;gt;checkpoints. However, very few tools and techniques exist or are&amp;lt;br&amp;gt;readily available when performing application security design reviews.&amp;lt;br&amp;gt;The full process of application security should be agreed upon during&amp;lt;br&amp;gt;the design phase by the security department and all relevant&amp;lt;br&amp;gt;application development teams. The direction of the projects and the&amp;lt;br&amp;gt;patterns used in the application architectures can also be augmented&amp;lt;br&amp;gt;from an application security perspective.&amp;lt;br&amp;gt;This presentation will provide discussion around how to solve many of&amp;lt;br&amp;gt;these and other challenges in application security. The focus will be&amp;lt;br&amp;gt;on web applications that use common technologies, such as managed code&amp;lt;br&amp;gt;frameworks.&amp;lt;br&amp;gt;Bio:&amp;lt;br&amp;gt;Andre has contributed to many OWASP documents and has been working in&amp;lt;br&amp;gt;the appsec space for almost 5 years. He is a local to the Phoenix area&amp;lt;br&amp;gt;and has presented on application security topics recently at BSides,&amp;lt;br&amp;gt;OWASP, and Toorcon events. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Professional Burping''' &lt;br /&gt;
&lt;br /&gt;
Burp suite is by and large considered one of the de-facto tools for testing web applications for security flaws. This talk will cover many of the professional version only features and various advanced usages that can be done to really take advantage of all this tool has to offer. Topics will include a quick review of burp, effectively leveraging professional only tools, deep dive into intruder, and using 3rd party extensions.&amp;lt;br&amp;gt;Andrew Wilson's Bio:&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Debugger Basics: Software Cracking and Buffer Overflows'''&amp;lt;br&amp;gt;Finding and exploiting a basic buffer overflow, start to finish including fuzzing to command shell. A small primer before &amp;quot;warez and keygens&amp;quot;: bypassing a serial number based registration for software, the most basic form of software cracking. &lt;br /&gt;
&lt;br /&gt;
Bio: &amp;lt;br&amp;gt;Scott White is a Senior Penetration Tester for SecureState LLC, a pure play information securityassessment company based in Cleveland, Ohio. He is the web application security expert on the Profiling team. His day to day duties include web application security assessments, internal, external, and physical penetration tests, source code reviews, and developer training. Scott holds a bachelors of science in computer science and a master of science in network security. With over 5 years working with security and over 10 years programming experience, he has a thorough web application security understanding from both the developer and attacker viewpoints. He has spoken at Defcon, the world’s largest hacker’s convention held in Las Vegas each year, and has also been called on by organizations such as the FBI and Secret Service as a subject matter expert.&amp;lt;br&amp;gt;Scott White&amp;lt;br&amp;gt;Senior Penetration Tester&amp;lt;br&amp;gt;www.securestate.com&amp;lt;br&amp;gt;http://securestate.blogspot.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Database Security and Encryption, Adrian Lane''' &lt;br /&gt;
&lt;br /&gt;
Bio: Adrian is a Security Strategist and brings over 22 years of industry experience to the Securosis team, much of it at the executive level. Adrian specializes in database security, data security, and software development. With experience at Ingres, Oracle, and Unisys, he has extensive experience in the vendor community, but brings a pragmatic perspective to selecting and deploying technologies having worked on &amp;quot;the other side&amp;quot; as CIO in the finance vertical. Prior to joining Securosis, Adrian served as the CTO/VP at companies such as IPLocks, Touchpoint, CPMi and Transactor/Brodia. He has been invited to present at dozens of security conferences, contributed articles to many major publications, and is easily recognizable by his &amp;quot;network hair&amp;quot; and propensity to wear loud colors. Once you get past his windy rants on data security and incessant coffee consumption, he is quite entertaining. Adrian is a Computer Science graduate of the University of California at Berkeley with post-graduate work in operating systems at Stanford University. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''masSEXploitation, Mike Brooks&amp;lt;br&amp;gt;''' This talk covers the use of chaining vulnerabilities in order to bypass layered security systems. This talk will also cover ways of obtaining wormable remote code execution on a modern LAMP platform. These attacks where developed by me, and they are very new. These attacks are as real as it gets, and the results are making the headlines. &lt;br /&gt;
&lt;br /&gt;
Bio: I will be giving this talk at this years Defcon and it will 3rd year in a row that I spoken. According to the Department of Homeland Security I have found a vulnerability with a severity metric of 13.5 which makes it into the top 1,000 most dangerous of all time. I am the top answerer of security questions on StackOverflow.com (The Rook). I actively hunt for vulnerabilities on a verity of platforms. I write exploit code and make it public. &lt;br /&gt;
&lt;br /&gt;
[http://www.exploit-db.com/exploits/16103/ http://www.exploit-db.com/exploits/16103/] (Directory Traversal exploitable via email)&amp;lt;br&amp;gt;[http://www.exploit-db.com/exploits/15838/ http://www.exploit-db.com/exploits/15838/] (Exploit chain:captcha bypass-&amp;amp;gt;sqli(insert)-&amp;amp;gt;persistant xss on front page) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;'''Involuntary Case Studies in Data Breaches, Rich Mogull, Securosis''' &lt;br /&gt;
&lt;br /&gt;
It's absolutely bass ackwards, but while the bad guys constantly share details of their exploits, including techniques, when it comes to real incidents, actual defenders rarely talk about what worked, and what didn't. Our entire industry is built on anecdote and the few tidbits we can glean from press reports. Thus we, as an industry, don't link means and methods to actual security outcomes. Without this information we're like a bunch of blindfolded wannabe ninjas trying to catch rounds from a machine gun with our bare hands. In this session we'll name names as we build in-depth case studies based on publicly available information, some of which isn't overly public. We will combine these with the latest information from breach reports released by incident response companies and the Dataloss Database. The session will build a picture of how real breaches happen, which security controls really work, and which compliance checkboxes are a complete and total waste of time. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Application Security Tools&amp;lt;br&amp;gt;''' [http://www.owasp.org/index.php/Image:Scanner-Sparkly.ppt A Scanner Sparkly] - Web Application Proxy Editors and Scanners - Andre Gironda&amp;lt;br&amp;gt; [http://www.owasp.org/index.php/Image:Owasp-lessonslearned.ppt Gray Box Assessment Lessons Learned] - Adam Muntner&amp;lt;br&amp;gt; Risk Assessment Considerations for Web Applications (brief talk+discussion) - Erich Newell &lt;br /&gt;
&lt;br /&gt;
'''[http://www.owasp.org/index.php/Image:Same-origin.pdf Reflections on Trusting the Same-Origin Policy] â and other web+network trust issues â Andre Gironda'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In computing, the same origin policy is an important security measure for client-side scripting (mostly Javascript). It prevents a document or script loaded from one &amp;quot;origin&amp;quot; from getting or setting properties of a document from a different &amp;quot;origin&amp;quot;. It was designed to protect browsers from executing code from external websites, which could be malicious. &lt;br /&gt;
&lt;br /&gt;
XSS and CSRF vulnerabilities exploit trust shared between a user and a website by circumventing the same-domain policy. DNS Pinning didn't pan out exactly right, either. Can client-side scripting allow malicious code to get into your browser history and cache? Can it enumerate what plugins you have installed in your browser, or even programs you have installed to your computer? Can it access and modify files on your local hard drive or other connected filesystems? Can client-side scripts be used to access and control everything you access online? Can it be used to scan and attack your Intranet / local network? Does an attacker have to target you in order to pull off one of these attacks successfully? If I turn off Javascript or use NoScript, am I safe? What other trust relationships does the web application n-Tier model break? &lt;br /&gt;
&lt;br /&gt;
'''Data@Risk â Protecting Web Applications Throughout the Development Lifecycle from Hackers - Brian Christian'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Brian Christian, Co-founder and Application Security Engineer, S.P.I. Dynamics, Inc. discussed what Web application security is and why it is needed throughout the entire development lifecycle. We will discuss common vulnerabilities in the Web application layer and why they are so easily exploited. This session demonstrates how to defend against common attacks at the Web application layer with examples covering Web application hacking methods such as SQL Injection, Blind SQL Injection, Cross-Site Scripting (XSS), Parameter Manipulation, etc. We will also review how compliance and regulatory legislation such as PCI, GLBA, HIPAA, CASB 1386, and Sarbanes-Oxley, etc. specifically relates to and affects Web application security. Additionally, we will examine how security throughout the development lifecycle is essential to the security of Web application code and the protection of proprietary data. &lt;br /&gt;
&lt;br /&gt;
'''Web Application 0-Day â Jon Rose'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Learn about how to identify, exploit, and remediate some of the most common security vulnerabilities in web applications. Weâll be using real-world examples in a dynamic, fun, and open discussion using publicly available source code.&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://www.stachliu.com/presentations/webapp0day/index.html Discovering Web Application Vulnerabilities with Google CodeSearch] &lt;br /&gt;
&lt;br /&gt;
'''Building Application Security into the SDLC - Adam Muntner'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Adam will share his experiences about how organizations can integrate application security into all phases of the Software Development Life Cycle, from the creation of functional specifications all the way through deployment, maintenance, and updates. He will explain how to &amp;quot;bake security in&amp;quot; rather than &amp;quot;ice it on.&amp;quot; &lt;br /&gt;
&lt;br /&gt;
[[Category:Arizona]]&lt;/div&gt;</summary>
		<author><name>Fuentes.joaquin</name></author>	</entry>

	</feed>