<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ggee</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ggee"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ggee"/>
		<updated>2026-05-20T05:58:30Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=63722</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=63722"/>
				<updated>2009-06-08T01:22:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
==Date and Location==&lt;br /&gt;
&lt;br /&gt;
OWASP Meeting&lt;br /&gt;
Monday, June 22nd * 5:30 pm &lt;br /&gt;
San Francisco Federal Reserve Bank Office &lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Federal Reserve Bank of San Francisco on Monday, June 22nd. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Please note, because of high security measures at the Federal Reserve Bank, pre-registration is REQUIRED, so you can be issued a badge before entering the meeting'''. &lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/355543440&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   5:30 PM - 6:15 PM ... Check-in and networking&lt;br /&gt;
   6:15 PM - 7:15 PM ... Analyzing Web Malware by Jeremy Brotherton&lt;br /&gt;
   7:15 PM - 7:30 PM ... Break&lt;br /&gt;
   7:30 PM - 8:30 PM ... Mobile Device Security by Dave Maynor&lt;br /&gt;
&lt;br /&gt;
===Analyzing Web Malware===&lt;br /&gt;
In its &amp;quot;State of Internet Security Q3/Q4 2008&amp;quot;, Websense reported that 70% of the top 100 websites either hosted malicious content or contained a masked redirect to compromised websites. Most recently, gumblar.cn successfully injected redirects into upwards of 3,000 websites. Analyzing web-based malicious content can be time-consuming and complex. This presentation will describe several common Javascript obfuscation techniques and how to use open-source tools to reveal the exploits hidden behind them.  Additionally, this presentation will describe the techniques used within the malicious Flash file which was being hosted by gumblar.cn.&lt;br /&gt;
&lt;br /&gt;
===Mobile Device Security===&lt;br /&gt;
This presentation will detail auditing and development techniques for exploits that target mobile phones with a heavy emphasis on threats that come from the web.  Windows mobile and Google Android devices that will target the auditing and exploit discovery.&lt;br /&gt;
&lt;br /&gt;
==About the Speakers==&lt;br /&gt;
===Jeremy Brotherton===&lt;br /&gt;
Jeremy graduated from Iowa State University in 2006 with a Bachelor’s degree in Computer Engineering with an emphasis in Information Assurance.  Currently, he is pursuing a Master’s degree in Computer Science at Stanford specializing in Computer and Network Security.  Research interests include web-based malware and exploits, Intrusion Detection Systems and Forensics. &lt;br /&gt;
&lt;br /&gt;
===Dave Maynor===&lt;br /&gt;
Mr. Maynor has a strong background in application security, reverse engineering and exploit development. Before joining Accuvant, Dave cofounded Errata Security - a think tank organization that specializes in rapid application development and security research. Prior to Errata, Dave was the Senior Researcher for Secureworks and a research engineer with the ISS X-Force R&amp;amp;D team. A well recognized personality in the information security world, Dave is a popular author and has been featured in multiple publications over the last several years including Fox News, CNN, the Associated Press, Security Focus and a multitude of other information security news sources. Dave has been both a primary and contributing author to several industry leading security books including: Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research, Syngress Force Emerging Threat Analysis: From Mischief to Malicious, and War Driving and Wireless Penetration Testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/355543440&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders ====&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=63721</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=63721"/>
				<updated>2009-06-08T01:14:29Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
==Date and Location==&lt;br /&gt;
&lt;br /&gt;
OWASP Meeting&lt;br /&gt;
Monday, June 22nd * 5:30 pm &lt;br /&gt;
San Francisco Federal Reserve Bank Office &lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Federal Reserve Bank of San Francisco on Monday, June 22nd. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Please note, because of high security measures at the Federal Reserve Bank, pre-registration is REQUIRED, so you can be issued a badge before entering the meeting'''. &lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/355543440&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   5:30 PM - 6:15 PM ... Check-in and networking&lt;br /&gt;
   6:15 PM - 7:15 PM ... Analyzing Web Malware by Jeremy Brotherton&lt;br /&gt;
   7:15 PM - 7:30 PM ... Break&lt;br /&gt;
   7:30 PM - 8:30 PM ... Mobile Device Security by Dave Maynor&lt;br /&gt;
&lt;br /&gt;
==Presentations==&lt;br /&gt;
===Analyzing Web Malware===&lt;br /&gt;
In its &amp;quot;State of Internet Security Q3/Q4 2008&amp;quot;, Websense reported that 70% of the top 100 websites either hosted malicious content or contained a masked redirect to compromised websites. Most recently, gumblar.cn successfully injected redirects into upwards of 3,000 websites. Analyzing web-based malicious content can be time-consuming and complex. This presentation will describe several common Javascript obfuscation techniques and how to use open-source tools to reveal the exploits hidden behind them.  Additionally, this presentation will describe the techniques used within the malicious Flash file which was being hosted by gumblar.cn.&lt;br /&gt;
&lt;br /&gt;
===Mobile Device Security===&lt;br /&gt;
This presentation will detail auditing and development techniques for exploits that target mobile phones with a heavy emphasis on threats that come from the web.  Windows mobile and Google Android devices that will target the auditing and exploit discovery.&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
===Jeremy Brotherton===&lt;br /&gt;
Jeremy graduated from Iowa State University in 2006 with a Bachelor’s degree in Computer Engineering with an emphasis in Information Assurance.  Currently, he is pursuing a Master’s degree in Computer Science at Stanford specializing in Computer and Network Security.  Research interests include web-based malware and exploits, Intrusion Detection Systems and Forensics. &lt;br /&gt;
&lt;br /&gt;
===Dave Maynor===&lt;br /&gt;
Mr. Maynor has a strong background in application security, reverse engineering and exploit development. Before joining Accuvant, Dave cofounded Errata Security - a think tank organization that specializes in rapid application development and security research. Prior to Errata, Dave was the Senior Researcher for Secureworks and a research engineer with the ISS X-Force R&amp;amp;D team. A well recognized personality in the information security world, Dave is a popular author and has been featured in multiple publications over the last several years including Fox News, CNN, the Associated Press, Security Focus and a multitude of other information security news sources. Dave has been both a primary and contributing author to several industry leading security books including: Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research, Syngress Force Emerging Threat Analysis: From Mischief to Malicious, and War Driving and Wireless Penetration Testing.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/355543440&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders ====&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=63720</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=63720"/>
				<updated>2009-06-08T01:12:38Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: /* Speakers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
==Date and Location==&lt;br /&gt;
&lt;br /&gt;
OWASP Meeting&lt;br /&gt;
Monday, June 22nd * 5:30 pm &lt;br /&gt;
San Francisco Federal Reserve Bank Office &lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Federal Reserve Bank of San Francisco on Monday, June 22nd. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Please note, because of high security measures at the Federal Reserve Bank, pre-registration is REQUIRED, so you can be issued a badge before entering the meeting'''. &lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/355543440&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   5:30 PM - 6:15 PM ... Check-in and networking&lt;br /&gt;
   6:15 PM - 7:15 PM ... Analyzing Web Malware by Jeremy Brotherton&lt;br /&gt;
   7:15 PM - 7:30 PM ... Break&lt;br /&gt;
   7:30 PM - 8:30 PM ... Mobile Device Security by Dave Maynor&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
=Jeremy Brotherton=&lt;br /&gt;
Jeremy graduated from Iowa State University in 2006 with a Bachelor’s degree in Computer Engineering with an emphasis in Information Assurance.  Currently, he is pursuing a Master’s degree in Computer Science at Stanford specializing in Computer and Network Security.  Research interests include web-based malware and exploits, Intrusion Detection Systems and Forensics. &lt;br /&gt;
&lt;br /&gt;
=Dave Maynor=&lt;br /&gt;
Mr. Maynor has a strong background in application security, reverse engineering and exploit development. Before joining Accuvant, Dave cofounded Errata Security - a think tank organization that specializes in rapid application development and security research. Prior to Errata, Dave was the Senior Researcher for Secureworks and a research engineer with the ISS X-Force R&amp;amp;D team. A well recognized personality in the information security world, Dave is a popular author and has been featured in multiple publications over the last several years including Fox News, CNN, the Associated Press, Security Focus and a multitude of other information security news sources. Dave has been both a primary and contributing author to several industry leading security books including: Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research, Syngress Force Emerging Threat Analysis: From Mischief to Malicious, and War Driving and Wireless Penetration Testing.&lt;br /&gt;
&lt;br /&gt;
Presentation - Analyzing Web Malware&lt;br /&gt;
In its &amp;quot;State of Internet Security Q3/Q4 2008&amp;quot;, Websense reported that 70% of the top 100 websites either hosted malicious content or contained a masked redirect to compromised websites. Most recently, gumblar.cn successfully injected redirects into upwards of 3,000 websites. Analyzing web-based malicious content can be time-consuming and complex. This presentation will describe several common Javascript obfuscation techniques and how to use open-source tools to reveal the exploits hidden behind them.  Additionally, this presentation will describe the techniques used within the malicious Flash file which was being hosted by gumblar.cn.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Presentation - Mobile Device Security&lt;br /&gt;
This presentation will detail auditing and development techniques for exploits that target mobile phones with a heavy emphasis on threats that come from the web.  Windows mobile and Google Android devices that will target the auditing and exploit discovery.&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/355543440&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders ====&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=63719</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=63719"/>
				<updated>2009-06-08T01:11:23Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
==Date and Location==&lt;br /&gt;
&lt;br /&gt;
OWASP Meeting&lt;br /&gt;
Monday, June 22nd * 5:30 pm &lt;br /&gt;
San Francisco Federal Reserve Bank Office &lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Federal Reserve Bank of San Francisco on Monday, June 22nd. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Please note, because of high security measures at the Federal Reserve Bank, pre-registration is REQUIRED, so you can be issued a badge before entering the meeting'''. &lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/355543440&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   5:30 PM - 6:15 PM ... Check-in and networking&lt;br /&gt;
   6:15 PM - 7:15 PM ... Analyzing Web Malware by Jeremy Brotherton&lt;br /&gt;
   7:15 PM - 7:30 PM ... Break&lt;br /&gt;
   7:30 PM - 8:30 PM ... Mobile Device Security by Dave Maynor&lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
Jeremy Brotherton&lt;br /&gt;
Jeremy graduated from Iowa State University in 2006 with a Bachelor’s degree in Computer Engineering with an emphasis in Information Assurance.  Currently, he is pursuing a Master’s degree in Computer Science at Stanford specializing in Computer and Network Security.  Research interests include web-based malware and exploits, Intrusion Detection Systems and Forensics. &lt;br /&gt;
&lt;br /&gt;
Presentation - Analyzing Web Malware&lt;br /&gt;
In its &amp;quot;State of Internet Security Q3/Q4 2008&amp;quot;, Websense reported that 70% of the top 100 websites either hosted malicious content or contained a masked redirect to compromised websites. Most recently, gumblar.cn successfully injected redirects into upwards of 3,000 websites. Analyzing web-based malicious content can be time-consuming and complex. This presentation will describe several common Javascript obfuscation techniques and how to use open-source tools to reveal the exploits hidden behind them.  Additionally, this presentation will describe the techniques used within the malicious Flash file which was being hosted by gumblar.cn.&lt;br /&gt;
&lt;br /&gt;
Dave Maynor&lt;br /&gt;
Mr. Maynor has a strong background in application security, reverse engineering and exploit development. Before joining Accuvant, Dave cofounded Errata Security - a think tank organization that specializes in rapid application development and security research. Prior to Errata, Dave was the Senior Researcher for Secureworks and a research engineer with the ISS X-Force R&amp;amp;D team. A well recognized personality in the information security world, Dave is a popular author and has been featured in multiple publications over the last several years including Fox News, CNN, the Associated Press, Security Focus and a multitude of other information security news sources. Dave has been both a primary and contributing author to several industry leading security books including: Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research, Syngress Force Emerging Threat Analysis: From Mischief to Malicious, and War Driving and Wireless Penetration Testing.&lt;br /&gt;
&lt;br /&gt;
Presentation - Mobile Device Security&lt;br /&gt;
This presentation will detail auditing and development techniques for exploits that target mobile phones with a heavy emphasis on threats that come from the web.  Windows mobile and Google Android devices that will target the auditing and exploit discovery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/355543440&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders ====&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=63718</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=63718"/>
				<updated>2009-06-08T01:10:59Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: /* Bold text=Date and Location= */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
==Date and Location==&lt;br /&gt;
&lt;br /&gt;
OWASP Meeting&lt;br /&gt;
Monday, June 22nd * 5:30 pm &lt;br /&gt;
San Francisco Federal Reserve Bank Office &lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Federal Reserve Bank of San Francisco on Monday, June 22nd. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
'''&lt;br /&gt;
Please note, because of high security measures at the Federal Reserve Bank, pre-registration is REQUIRED, so you can be issued a badge before entering the meeting'''. &lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/355543440&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
5:30 PM - 6:15 PM ... Check-in and networking&lt;br /&gt;
6:15 PM - 7:15 PM ... Analyzing Web Malware by Jeremy Brotherton&lt;br /&gt;
7:15 PM - 7:30 PM ... Break&lt;br /&gt;
7:30 PM - 8:30 PM ... Mobile Device Security by Dave Maynor &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
Jeremy Brotherton&lt;br /&gt;
Jeremy graduated from Iowa State University in 2006 with a Bachelor’s degree in Computer Engineering with an emphasis in Information Assurance.  Currently, he is pursuing a Master’s degree in Computer Science at Stanford specializing in Computer and Network Security.  Research interests include web-based malware and exploits, Intrusion Detection Systems and Forensics. &lt;br /&gt;
&lt;br /&gt;
Presentation - Analyzing Web Malware&lt;br /&gt;
In its &amp;quot;State of Internet Security Q3/Q4 2008&amp;quot;, Websense reported that 70% of the top 100 websites either hosted malicious content or contained a masked redirect to compromised websites. Most recently, gumblar.cn successfully injected redirects into upwards of 3,000 websites. Analyzing web-based malicious content can be time-consuming and complex. This presentation will describe several common Javascript obfuscation techniques and how to use open-source tools to reveal the exploits hidden behind them.  Additionally, this presentation will describe the techniques used within the malicious Flash file which was being hosted by gumblar.cn.&lt;br /&gt;
&lt;br /&gt;
Dave Maynor&lt;br /&gt;
Mr. Maynor has a strong background in application security, reverse engineering and exploit development. Before joining Accuvant, Dave cofounded Errata Security - a think tank organization that specializes in rapid application development and security research. Prior to Errata, Dave was the Senior Researcher for Secureworks and a research engineer with the ISS X-Force R&amp;amp;D team. A well recognized personality in the information security world, Dave is a popular author and has been featured in multiple publications over the last several years including Fox News, CNN, the Associated Press, Security Focus and a multitude of other information security news sources. Dave has been both a primary and contributing author to several industry leading security books including: Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research, Syngress Force Emerging Threat Analysis: From Mischief to Malicious, and War Driving and Wireless Penetration Testing.&lt;br /&gt;
&lt;br /&gt;
Presentation - Mobile Device Security&lt;br /&gt;
This presentation will detail auditing and development techniques for exploits that target mobile phones with a heavy emphasis on threats that come from the web.  Windows mobile and Google Android devices that will target the auditing and exploit discovery.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
http://www.eventbrite.com/event/355543440&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
==== Bay Area OWASP Chapter Leaders ====&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55499</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55499"/>
				<updated>2009-02-25T21:39:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''March 18th @ 6PM - Gap Inc'''&lt;br /&gt;
   Conference Center C&lt;br /&gt;
   2 Folsom Street,&lt;br /&gt;
   San Francisco , CA 94105&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at Gap Inc in San Francisco on Wednesday, March 18th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Gap Inc for hosting this event and to ___, ___ for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   5:45 PM - 6:15 PM ... Check-in and registration&lt;br /&gt;
   6:15 PM - 7:15 PM ... Back to the Future - Phishing and Malware by Brendan O’Conner, Saleforce.com&lt;br /&gt;
   7:15 PM - 7:30 PM ... Break&lt;br /&gt;
   7:30 PM - 8:30 PM ... Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else by Kirk Greene, Accuvant&lt;br /&gt;
   &lt;br /&gt;
==Speakers==&lt;br /&gt;
&lt;br /&gt;
'''Back to the Future - Phishing and Malware''' by Brendan O’Conner, Saleforce.com&lt;br /&gt;
&lt;br /&gt;
Abstract:  The more things change, the more they stay the same.  We'll take a trip back in time to look at the phishing and anti-malware solutions of the past.  Why did they fail?  With companies investing hundreds of thousands of dollars  or more in these solutions, what does the future of this space look like and what tricks can you apply to stay one step ahead?&lt;br /&gt;
&lt;br /&gt;
Bio:  Brendan O'Connor is originally from the Midwest , currently residing in the Bay Area as a security engineer .  He worked in security for a communications company for four years before switching to the financial sector in 2004 and onto Software as a Service in 2008.  Brendan currently works on the Product Security team at Salesforce.com, where his duties include vulnerability research, security architecture, and application security.&lt;br /&gt;
&lt;br /&gt;
'''Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else''' by Kirk Greene, Accuvant&lt;br /&gt;
&lt;br /&gt;
Abstract:  In this presentation we will discuss the different testing methodologies used when assessing the security of both binary applications as well as web-based applications. We will focus on the differences and advantages as they relate to black-box testing, white-box testing, gray-box testing, reverse engineering, and fuzzing. Unfortunately there is no one testing methodology that provides the best balance of time and accuracy for every application, in this talk we will provide metrics for helping decide what methodology should be used for what types of applications.&lt;br /&gt;
&lt;br /&gt;
Bio:  Kirk has been providing security consulting services for over a decade. Through that time Kirk has served clients in a variety of industries including federal and local government, healthcare, financial services, telecommunications, e-Commerce, fuel and natural gases, manufacturing, application service providers, gaming, Internet start-ups, and Internet service providers. In his tenure with Accuvant, Kirk has performed a variety of consulting and managerial responsibilities from developing and performing financial institution regulation audits to managing performing enterprise assessments for multi-national corporations. Kirk is a Certified Information Systems Security Professional (CISSP), ISS Certified Engineer, PCI Qualified Data Security Professional (QDSP), Qualified Payment Application Security Professional (QPASP).&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
Please RSVP at http://bayareaowasp.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55498</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55498"/>
				<updated>2009-02-25T21:37:57Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''March 18th @ 6PM - Gap Inc'''&lt;br /&gt;
   Conference Center C&lt;br /&gt;
   2 Folsom Street,&lt;br /&gt;
   San Francisco , CA 94105&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at Gap Inc in San Francisco on Wednesday, March 18th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Gap Inc for hosting this event and to ___, ___ for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00 PM - 6:45 PM ... Check-in and registration&lt;br /&gt;
   6:45 PM - 7:45 PM ... Back to the Future - Phishing and Malware by Brendan O’Conner, Saleforce.com&lt;br /&gt;
   7:45 PM - 8:00 PM ... Break&lt;br /&gt;
   8:00 PM - 9:00 PM ... Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else by Kirk Greene, Accuvant&lt;br /&gt;
   &lt;br /&gt;
==Speakers==&lt;br /&gt;
&lt;br /&gt;
'''Back to the Future - Phishing and Malware''' by Brendan O’Conner, Saleforce.com&lt;br /&gt;
&lt;br /&gt;
Abstract:  The more things change, the more they stay the same.  We'll take a trip back in time to look at the phishing and anti-malware solutions of the past.  Why did they fail?  With companies investing hundreds of thousands of dollars  or more in these solutions, what does the future of this space look like and what tricks can you apply to stay one step ahead?&lt;br /&gt;
&lt;br /&gt;
Bio:  Brendan O'Connor is originally from the Midwest , currently residing in the Bay Area as a security engineer .  He worked in security for a communications company for four years before switching to the financial sector in 2004 and onto Software as a Service in 2008.  Brendan currently works on the Product Security team at Salesforce.com, where his duties include vulnerability research, security architecture, and application security.&lt;br /&gt;
&lt;br /&gt;
'''Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else''' by Kirk Greene, Accuvant&lt;br /&gt;
&lt;br /&gt;
Abstract:  In this presentation we will discuss the different testing methodologies used when assessing the security of both binary applications as well as web-based applications. We will focus on the differences and advantages as they relate to black-box testing, white-box testing, gray-box testing, reverse engineering, and fuzzing. Unfortunately there is no one testing methodology that provides the best balance of time and accuracy for every application, in this talk we will provide metrics for helping decide what methodology should be used for what types of applications.&lt;br /&gt;
&lt;br /&gt;
Bio:  Kirk has been providing security consulting services for over a decade. Through that time Kirk has served clients in a variety of industries including federal and local government, healthcare, financial services, telecommunications, e-Commerce, fuel and natural gases, manufacturing, application service providers, gaming, Internet start-ups, and Internet service providers. In his tenure with Accuvant, Kirk has performed a variety of consulting and managerial responsibilities from developing and performing financial institution regulation audits to managing performing enterprise assessments for multi-national corporations. Kirk is a Certified Information Systems Security Professional (CISSP), ISS Certified Engineer, PCI Qualified Data Security Professional (QDSP), Qualified Payment Application Security Professional (QPASP).&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
Please RSVP at http://bayareaowasp.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=55420</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=55420"/>
				<updated>2009-02-25T06:08:45Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
*2009-03-18&lt;br /&gt;
**Location: Gap Inc, Conference Center C, 2 Folsom Street, San Francisco, CA 94105&lt;br /&gt;
**Speaker: Brendan O’Conner: Back to the Future - Phishing and Malware&lt;br /&gt;
**Speaker: Kirk Greene: Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else&lt;br /&gt;
&lt;br /&gt;
*2008-12-11&lt;br /&gt;
**Location: Network Meeting Center, TechMart Center, 5201 Great America Parkway, Santa Clara, CA 95054 &lt;br /&gt;
**Speaker: Brian Shura: Protecting Website Users from Each Other&lt;br /&gt;
**Speaker: Trey Ford: Making Money the Black Hat Way&lt;br /&gt;
&lt;br /&gt;
*2008-06-25&lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043&lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations] | [https://www.owasp.org/index.php/Image:BayArea-June08-Evaluation.Data.zip Evaluation Data]&lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter&lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises&lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery&lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security&lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21&lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588&lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.]&lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=55419</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=55419"/>
				<updated>2009-02-25T06:07:25Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
*2008-12-11&lt;br /&gt;
**Location: Network Meeting Center, TechMart Center, 5201 Great America Parkway, Santa Clara, CA 95054 &lt;br /&gt;
**Speaker: Brian Shura: Protecting Website Users from Each Other&lt;br /&gt;
**Speaker: Trey Ford: Making Money the Black Hat Way&lt;br /&gt;
&lt;br /&gt;
*2008-06-25&lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043&lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations] | [https://www.owasp.org/index.php/Image:BayArea-June08-Evaluation.Data.zip Evaluation Data]&lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter&lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises&lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery&lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security&lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21&lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588&lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.]&lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55418</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55418"/>
				<updated>2009-02-25T06:01:19Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''March 18th @ 6PM - Gap Inc'''&lt;br /&gt;
   Conference Center C&lt;br /&gt;
   2 Folsom Street,&lt;br /&gt;
   San Francisco , CA 94105&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at Gap Inc in San Francisco on Wednesday, March 18th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Gap Inc for hosting this event and to ___, ___ for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00 PM - 6:45 PM ... Check-in and registration&lt;br /&gt;
   6:45 PM - 7:45 PM ... Back to the Future - Phishing and Malware by Brendan O’Conner, Saleforce.com&lt;br /&gt;
   7:45 PM - 8:00 PM ... Break&lt;br /&gt;
   8:00 PM - 9:00 PM ... Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else by Kirk Greene, Accuvant&lt;br /&gt;
   &lt;br /&gt;
==Speakers==&lt;br /&gt;
&lt;br /&gt;
'''Back to the Future - Phishing and Malware''' by Brendan O’Conner, Saleforce.com&lt;br /&gt;
&lt;br /&gt;
Abstract:  The more things change, the more they stay the same.  We'll take a trip back in time to look at the phishing and anti-malware solutions of the past.  Why did they fail?  With companies investing hundreds of thousands of dollars  or more in these solutions, what does the future of this space look like and what tricks can you apply to stay one step ahead?&lt;br /&gt;
&lt;br /&gt;
Bio:  Brendan O'Connor is originally from the Midwest , currently residing in the Bay Area as a security engineer .  He worked in security for a communications company for four years before switching to the financial sector in 2004 and onto Software as a Service in 2008.  Brendan currently works on the Product Security team at Salesforce.com, where his duties include vulnerability research, security architecture, and application security.&lt;br /&gt;
&lt;br /&gt;
'''Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else''' by Kirk Greene, Accuvant&lt;br /&gt;
&lt;br /&gt;
Abstract:  In this presentation we will discuss the different testing methodologies used when assessing the security of both binary applications as well as web-based applications. We will focus on the differences and advantages as they relate to black-box testing, white-box testing, gray-box testing, reverse engineering, and fuzzing. Unfortunately there is no one testing methodology that provides the best balance of time and accuracy for every application, in this talk we will provide metrics for helping decide what methodology should be used for what types of applications.&lt;br /&gt;
&lt;br /&gt;
Bio:  Kirk has been providing security consulting services for over a decade. Through that time Kirk has served clients in a variety of industries including federal and local government, healthcare, financial services, telecommunications, e-Commerce, fuel and natural gases, manufacturing, application service providers, gaming, Internet start-ups, and Internet service providers. In his tenure with Accuvant, Kirk has performed a variety of consulting and managerial responsibilities from developing and performing financial institution regulation audits to managing performing enterprise assessments for multi-national corporations. Kirk is a Certified Information Systems Security Professional (CISSP), ISS Certified Engineer, PCI Qualified Data Security Professional (QDSP), Qualified Payment Application Security Professional (QPASP).&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
Please RSVP at http://owaspbajune2008.eventbrite.com &lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55417</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55417"/>
				<updated>2009-02-25T06:00:47Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''March 18th @ 6PM - Gap Inc'''&lt;br /&gt;
   Conference Center C&lt;br /&gt;
   2 Folsom Street,&lt;br /&gt;
   San Francisco , CA 94105&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at Gap Inc in San Francisco on Wednesday, March 18th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Gap Inc for hosting this event and to ___, ___ for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:15 PM - 6:45 PM ... Check-in and registration&lt;br /&gt;
   6:45 PM - 7:45 PM ... Back to the Future - Phishing and Malware by Brendan O’Conner, Saleforce.com&lt;br /&gt;
   7:45 PM - 8:00 PM ... Break&lt;br /&gt;
   8:00 PM - 9:00 PM ... Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else by Kirk Greene, Accuvant&lt;br /&gt;
   &lt;br /&gt;
==Speakers==&lt;br /&gt;
&lt;br /&gt;
'''Back to the Future - Phishing and Malware''' by Brendan O’Conner, Saleforce.com&lt;br /&gt;
&lt;br /&gt;
Abstract:  The more things change, the more they stay the same.  We'll take a trip back in time to look at the phishing and anti-malware solutions of the past.  Why did they fail?  With companies investing hundreds of thousands of dollars  or more in these solutions, what does the future of this space look like and what tricks can you apply to stay one step ahead?&lt;br /&gt;
&lt;br /&gt;
Bio:  Brendan O'Connor is originally from the Midwest , currently residing in the Bay Area as a security engineer .  He worked in security for a communications company for four years before switching to the financial sector in 2004 and onto Software as a Service in 2008.  Brendan currently works on the Product Security team at Salesforce.com, where his duties include vulnerability research, security architecture, and application security.&lt;br /&gt;
&lt;br /&gt;
'''Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else''' by Kirk Greene, Accuvant&lt;br /&gt;
&lt;br /&gt;
Abstract:  In this presentation we will discuss the different testing methodologies used when assessing the security of both binary applications as well as web-based applications. We will focus on the differences and advantages as they relate to black-box testing, white-box testing, gray-box testing, reverse engineering, and fuzzing. Unfortunately there is no one testing methodology that provides the best balance of time and accuracy for every application, in this talk we will provide metrics for helping decide what methodology should be used for what types of applications.&lt;br /&gt;
&lt;br /&gt;
Bio:  Kirk has been providing security consulting services for over a decade. Through that time Kirk has served clients in a variety of industries including federal and local government, healthcare, financial services, telecommunications, e-Commerce, fuel and natural gases, manufacturing, application service providers, gaming, Internet start-ups, and Internet service providers. In his tenure with Accuvant, Kirk has performed a variety of consulting and managerial responsibilities from developing and performing financial institution regulation audits to managing performing enterprise assessments for multi-national corporations. Kirk is a Certified Information Systems Security Professional (CISSP), ISS Certified Engineer, PCI Qualified Data Security Professional (QDSP), Qualified Payment Application Security Professional (QPASP).&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
Please RSVP at http://owaspbajune2008.eventbrite.com &lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55416</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55416"/>
				<updated>2009-02-25T06:00:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''March 18th @ 6PM - Gap Inc'''&lt;br /&gt;
   Conference Center C&lt;br /&gt;
   2 Folsom Street,&lt;br /&gt;
   San Francisco , CA 94105&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at Gap Inc in San Francisco on Wednesday, March 18th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Gap Inc for hosting this event and to ___, ___ for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6.15 PM - 6.45 PM ... Check-in and registration&lt;br /&gt;
   6:45 PM - 7:45 PM ... Back to the Future - Phishing and Malware by Brendan O’Conner, Saleforce.com&lt;br /&gt;
   7:45 PM - 8:00 PM ... Break&lt;br /&gt;
   8:00 PM - 9:00 PM ... Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else by Kirk Greene, Accuvant&lt;br /&gt;
   &lt;br /&gt;
==Speakers==&lt;br /&gt;
&lt;br /&gt;
'''Back to the Future - Phishing and Malware''' by Brendan O’Conner, Saleforce.com&lt;br /&gt;
&lt;br /&gt;
Abstract:  The more things change, the more they stay the same.  We'll take a trip back in time to look at the phishing and anti-malware solutions of the past.  Why did they fail?  With companies investing hundreds of thousands of dollars  or more in these solutions, what does the future of this space look like and what tricks can you apply to stay one step ahead?&lt;br /&gt;
&lt;br /&gt;
Bio:  Brendan O'Connor is originally from the Midwest , currently residing in the Bay Area as a security engineer .  He worked in security for a communications company for four years before switching to the financial sector in 2004 and onto Software as a Service in 2008.  Brendan currently works on the Product Security team at Salesforce.com, where his duties include vulnerability research, security architecture, and application security.&lt;br /&gt;
&lt;br /&gt;
'''Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else''' by Kirk Greene, Accuvant&lt;br /&gt;
&lt;br /&gt;
Abstract:  In this presentation we will discuss the different testing methodologies used when assessing the security of both binary applications as well as web-based applications. We will focus on the differences and advantages as they relate to black-box testing, white-box testing, gray-box testing, reverse engineering, and fuzzing. Unfortunately there is no one testing methodology that provides the best balance of time and accuracy for every application, in this talk we will provide metrics for helping decide what methodology should be used for what types of applications.&lt;br /&gt;
&lt;br /&gt;
Bio:  Kirk has been providing security consulting services for over a decade. Through that time Kirk has served clients in a variety of industries including federal and local government, healthcare, financial services, telecommunications, e-Commerce, fuel and natural gases, manufacturing, application service providers, gaming, Internet start-ups, and Internet service providers. In his tenure with Accuvant, Kirk has performed a variety of consulting and managerial responsibilities from developing and performing financial institution regulation audits to managing performing enterprise assessments for multi-national corporations. Kirk is a Certified Information Systems Security Professional (CISSP), ISS Certified Engineer, PCI Qualified Data Security Professional (QDSP), Qualified Payment Application Security Professional (QPASP).&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
Please RSVP at http://owaspbajune2008.eventbrite.com &lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55415</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55415"/>
				<updated>2009-02-25T05:58:18Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''March 18th @ 6PM - Gap Inc'''&lt;br /&gt;
   Conference Center C&lt;br /&gt;
   2 Folsom Street,&lt;br /&gt;
   San Francisco , CA 94105&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at Gap Inc in San Francisco on Wednesday, March 18th. As usual attendance is free and food and beverages will be provided. This will be an awesome event and a great opportunity to network with industry peers. The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Gap Inc for hosting this event and to ___, ___ for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   1.30 PM - 2.00 PM ... Check-in and registration&lt;br /&gt;
   2:00 PM - 2:10 PM ... Overview of the OWASP Bay Area Chapter - Mandeep Khera, Bay Area Chapter Leader&lt;br /&gt;
   2:10 PM - 2:55 PM ... Consumerization of enterprises: a security conundrum – Dr. Chenxi Wang, Principal Analyst, Forrester Group&lt;br /&gt;
   2:55 PM - 3:40 PM ... Cross-Site Request Forgery- New Attacks and Defenses - Collin Jackson, PH.D. student, Stanford University&lt;br /&gt;
   3:40 PM - 4:00 PM ... Networking Break&lt;br /&gt;
   4:00 PM - 4.45 PM ... Google Gadget Security - Tom Stracener, Cenzic&lt;br /&gt;
   4:45 PM - 5:30 PM ... How Cybercriminals Steal Money - Neil Daswani, Google &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
&lt;br /&gt;
'''Back to the Future - Phishing and Malware''' by Brendan O’Conner, Saleforce.com&lt;br /&gt;
&lt;br /&gt;
Abstract:  The more things change, the more they stay the same.  We'll take a trip back in time to look at the phishing and anti-malware solutions of the past.  Why did they fail?  With companies investing hundreds of thousands of dollars  or more in these solutions, what does the future of this space look like and what tricks can you apply to stay one step ahead?&lt;br /&gt;
&lt;br /&gt;
Bio:  Brendan O'Connor is originally from the Midwest , currently residing in the Bay Area as a security engineer .  He worked in security for a communications company for four years before switching to the financial sector in 2004 and onto Software as a Service in 2008.  Brendan currently works on the Product Security team at Salesforce.com, where his duties include vulnerability research, security architecture, and application security.&lt;br /&gt;
&lt;br /&gt;
'''Testing Methodologies:  White-box, Gray-Box, Black-box or Something Else''' by Kirk Greene, Accuvant&lt;br /&gt;
&lt;br /&gt;
Abstract:  In this presentation we will discuss the different testing methodologies used when assessing the security of both binary applications as well as web-based applications. We will focus on the differences and advantages as they relate to black-box testing, white-box testing, gray-box testing, reverse engineering, and fuzzing. Unfortunately there is no one testing methodology that provides the best balance of time and accuracy for every application, in this talk we will provide metrics for helping decide what methodology should be used for what types of applications.&lt;br /&gt;
&lt;br /&gt;
Bio:  Kirk has been providing security consulting services for over a decade. Through that time Kirk has served clients in a variety of industries including federal and local government, healthcare, financial services, telecommunications, e-Commerce, fuel and natural gases, manufacturing, application service providers, gaming, Internet start-ups, and Internet service providers. In his tenure with Accuvant, Kirk has performed a variety of consulting and managerial responsibilities from developing and performing financial institution regulation audits to managing performing enterprise assessments for multi-national corporations. Kirk is a Certified Information Systems Security Professional (CISSP), ISS Certified Engineer, PCI Qualified Data Security Professional (QDSP), Qualified Payment Application Security Professional (QPASP).&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
Please RSVP at http://owaspbajune2008.eventbrite.com &lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55414</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=55414"/>
				<updated>2009-02-25T05:51:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Bay Area&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''March 18th @ 6PM - Gap Inc'''&lt;br /&gt;
   Conference Center C&lt;br /&gt;
   2 Folsom Street,&lt;br /&gt;
   San Francisco , CA 94105&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its '''half day Application Security Summit''' at the Microsoft Facility in Mountain View on Wednesday, June 25th. As usual attendance is free and food and beverages will be provided. '''We have some excellent speakers lined up for this and it should be an event not to be missed.''' The event is open to the public. Please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Microsoft for hosting this event and to Cenzic and AppSec Consulting, Rapid7, and Imperva for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   1.30 PM - 2.00 PM ... Check-in and registration&lt;br /&gt;
   2:00 PM - 2:10 PM ... Overview of the OWASP Bay Area Chapter - Mandeep Khera, Bay Area Chapter Leader&lt;br /&gt;
   2:10 PM - 2:55 PM ... Consumerization of enterprises: a security conundrum – Dr. Chenxi Wang, Principal Analyst, Forrester Group&lt;br /&gt;
   2:55 PM - 3:40 PM ... Cross-Site Request Forgery- New Attacks and Defenses - Collin Jackson, PH.D. student, Stanford University&lt;br /&gt;
   3:40 PM - 4:00 PM ... Networking Break&lt;br /&gt;
   4:00 PM - 4.45 PM ... Google Gadget Security - Tom Stracener, Cenzic&lt;br /&gt;
   4:45 PM - 5:30 PM ... How Cybercriminals Steal Money - Neil Daswani, Google &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Consumerization of enterprises: a security conundrum''' by Dr. Chenxi Wang, Principal Analyst, Forrester Group&lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang is a principal analyst with Forrester. She leads Forrester's research in areas including content security, application security, threats and vulnerability management, and software security. Chenxi brings to Forrester years of sophisticated research experience; her previous experience includes a five-year stint as an associate research professor at Carnegie Mellon University, where she published many research papers on network security and distributed systems. &lt;br /&gt;
&lt;br /&gt;
Previously, Chenxi served as the chief scientist for KSR, a managed security service startup in the San Francisco bay area. Chenxi also serves as an investigative forensics expert for the Federal Trade Commission. She is the recipient of a Critical Infrastructure Protection Fellowship from the Army Research Office and the Samuel Alexander Fellowship of ACM for outstanding Ph.D. thesis research.&lt;br /&gt;
&lt;br /&gt;
'''Cross-Site Request Forgery- New Attacks and Defenses''' by Collin Jackson, PH.D. Student, Stanford University&lt;br /&gt;
&lt;br /&gt;
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability, but none of the three major CSRF defenses are satisfactory and many web sites neglect to prevent login CSRF. In a login CSRF attack, an attacker uses the victim's browser to forge a cross-site request to the honest site's login URL, supplying the attacker's user name and password. This forged request can disrupt the integrity of the session and enable theft of confidential information.&lt;br /&gt;
&lt;br /&gt;
Although the HTTP Referer header could be used as an effective general CSRF defense, our experiments indicate that the header is widely blocked at the network layer due to privacy concerns. Our experimental data shows, however, that the header can be used today as a reliable CSRF defense over HTTPS, which is ideal for login CSRF prevention. For the long term, we propose the Origin header, which provides the security beneﬁts of the Referer header while responding to privacy concerns. Additionally, we show that a network attacker can often disrupt session integrity even when the site deploys CSRF defenses, and propose additional defenses against these identity-misbinding attacks.&lt;br /&gt;
&lt;br /&gt;
Collin Jackson is a fourth-year Ph.D. student in Computer Science at Stanford University. His research focuses on browser vulnerabilities, web authentication, mashups, and web application security.&lt;br /&gt;
&lt;br /&gt;
'''Google Gadget Security''' by Tom Stracener,  Sr. Security Analyst, Cenzic&lt;br /&gt;
&lt;br /&gt;
Google Gadgets are HTML and Javascript applications that can be embedded in other web applications or the user's desktop (provided they are using Google Desktop). Gadget code is highly portable and can run on multiple sites or applications with few changes to the underlying code. This talk will focus on gadget security, an area where the current implementation is deeply flawed. We will examine Rsnake's XSS vulnerability in Google gadgets, consider possible attack scenarios, and also look at the reasons why Google chose not to fix this vulnerability. We take a critical look on they ways attackers can exploit the current Gadget implementation when performing attacks. This talk will provide the audience with background information for the upcoming Blackhat 2008 session &amp;quot;Xploiting Google Gadgets: Gmalware and Beyond&amp;quot; by Robert Hansen and Tom Stracener.&lt;br /&gt;
&lt;br /&gt;
Tom is the Senior Security Analyst for Cenzic’s CIA Labs. Mr. Stracener was one of the founding members of nCircle Network Security. While at nCircle he served as the head of vulnerability research from 1999 to 2001, developing one of the industry’s first quantitative vulnerability scoring systems, and co-inventing several patented technologies. Mr. Stracener is an experienced security consultant, penetration tester, and vulnerability researcher. One of his patents, “Interoperability of vulnerability and intrusion detection systems,” was granted by the USPTO in October 2005. Tom has spoken at various conferences including New York Security Conference, ISSA, OWASP, Defcon, and others.&lt;br /&gt;
&lt;br /&gt;
'''How Cybercriminals Steal Money''' by Neil Daswani, Google&lt;br /&gt;
&lt;br /&gt;
This talk discusses how we can prevent cybercrime due to the most significant emerging application security vulnerabilities.  Such vulnerabilities are used to commit various types of wide-scale fraud, and attacks based on them steal money right out of people's bank accounts, capture tens of millions of credit card numbers, and aid in the construction of next-generation botnets.&lt;br /&gt;
&lt;br /&gt;
In the talk, I will present some industry-wide statistics on software security vulnerabilities reported to various databases, and emerging trends in the field of software security.   This talk will then:&lt;br /&gt;
&lt;br /&gt;
* review how attacks such as XSRF (Cross-Site-Request-Forgery), XSSI (Cross-Site-Script-Inclusion), and SQL Injection work,&lt;br /&gt;
* discuss their impact on Web 2.0, AJAX, mashup, and social networking applications,&lt;br /&gt;
* outline how to defend against them, and&lt;br /&gt;
* describe how to modify a software development process to achieve security.&lt;br /&gt;
&lt;br /&gt;
Finally, the talk will discuss the current state of security education, and provide pointers to certification programs, books, and organizations where you and your colleagues can learn more.&lt;br /&gt;
&lt;br /&gt;
Neil Daswani has served in a variety of research , development, teaching, and managerial roles at Google, Stanford University , DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security).  His areas of expertise include security, wireless data technology, and peer-to-peer systems. He has published extensively in these areas, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University.  Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN 1590597842; http://tinyurl.com/33xs6g ) More information about Neil is available at http://www.neildaswani.com/&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
Please RSVP at http://owaspbajune2008.eventbrite.com &lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=36162</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=36162"/>
				<updated>2008-08-14T21:35:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''June 25th @ 2PM - Microsoft'''&lt;br /&gt;
   1065 La Avenida St.&lt;br /&gt;
   Mountain View, CA 94043&lt;br /&gt;
   Conference Room - Galileo&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its '''half day Application Security Summit''' at the Microsoft Facility in Mountain View on Wednesday, June 25th. As usual attendance is free and food and beverages will be provided. '''We have some excellent speakers lined up for this and it should be an event not to be missed.''' The event is open to the public. Please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Microsoft for hosting this event and to Cenzic and AppSec Consulting, Rapid7, and Imperva for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   1.30 PM - 2.00 PM ... Check-in and registration&lt;br /&gt;
   2:00 PM - 2:10 PM ... Overview of the OWASP Bay Area Chapter - Mandeep Khera, Bay Area Chapter Leader&lt;br /&gt;
   2:10 PM - 2:55 PM ... Consumerization of enterprises: a security conundrum – Dr. Chenxi Wang, Principal Analyst, Forrester Group&lt;br /&gt;
   2:55 PM - 3:40 PM ... Cross-Site Request Forgery- New Attacks and Defenses - Collin Jackson, PH.D. student, Stanford University&lt;br /&gt;
   3:40 PM - 4:00 PM ... Networking Break&lt;br /&gt;
   4:00 PM - 4.45 PM ... Google Gadget Security - Tom Stracener, Cenzic&lt;br /&gt;
   4:45 PM - 5:30 PM ... How Cybercriminals Steal Money - Neil Daswani, Google &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Consumerization of enterprises: a security conundrum''' by Dr. Chenxi Wang, Principal Analyst, Forrester Group&lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang is a principal analyst with Forrester. She leads Forrester's research in areas including content security, application security, threats and vulnerability management, and software security. Chenxi brings to Forrester years of sophisticated research experience; her previous experience includes a five-year stint as an associate research professor at Carnegie Mellon University, where she published many research papers on network security and distributed systems. &lt;br /&gt;
&lt;br /&gt;
Previously, Chenxi served as the chief scientist for KSR, a managed security service startup in the San Francisco bay area. Chenxi also serves as an investigative forensics expert for the Federal Trade Commission. She is the recipient of a Critical Infrastructure Protection Fellowship from the Army Research Office and the Samuel Alexander Fellowship of ACM for outstanding Ph.D. thesis research.&lt;br /&gt;
&lt;br /&gt;
'''Cross-Site Request Forgery- New Attacks and Defenses''' by Collin Jackson, PH.D. Student, Stanford University&lt;br /&gt;
&lt;br /&gt;
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability, but none of the three major CSRF defenses are satisfactory and many web sites neglect to prevent login CSRF. In a login CSRF attack, an attacker uses the victim's browser to forge a cross-site request to the honest site's login URL, supplying the attacker's user name and password. This forged request can disrupt the integrity of the session and enable theft of confidential information.&lt;br /&gt;
&lt;br /&gt;
Although the HTTP Referer header could be used as an effective general CSRF defense, our experiments indicate that the header is widely blocked at the network layer due to privacy concerns. Our experimental data shows, however, that the header can be used today as a reliable CSRF defense over HTTPS, which is ideal for login CSRF prevention. For the long term, we propose the Origin header, which provides the security beneﬁts of the Referer header while responding to privacy concerns. Additionally, we show that a network attacker can often disrupt session integrity even when the site deploys CSRF defenses, and propose additional defenses against these identity-misbinding attacks.&lt;br /&gt;
&lt;br /&gt;
Collin Jackson is a fourth-year Ph.D. student in Computer Science at Stanford University. His research focuses on browser vulnerabilities, web authentication, mashups, and web application security.&lt;br /&gt;
&lt;br /&gt;
'''Google Gadget Security''' by Tom Stracener,  Sr. Security Analyst, Cenzic&lt;br /&gt;
&lt;br /&gt;
Google Gadgets are HTML and Javascript applications that can be embedded in other web applications or the user's desktop (provided they are using Google Desktop). Gadget code is highly portable and can run on multiple sites or applications with few changes to the underlying code. This talk will focus on gadget security, an area where the current implementation is deeply flawed. We will examine Rsnake's XSS vulnerability in Google gadgets, consider possible attack scenarios, and also look at the reasons why Google chose not to fix this vulnerability. We take a critical look on they ways attackers can exploit the current Gadget implementation when performing attacks. This talk will provide the audience with background information for the upcoming Blackhat 2008 session &amp;quot;Xploiting Google Gadgets: Gmalware and Beyond&amp;quot; by Robert Hansen and Tom Stracener.&lt;br /&gt;
&lt;br /&gt;
Tom is the Senior Security Analyst for Cenzic’s CIA Labs. Mr. Stracener was one of the founding members of nCircle Network Security. While at nCircle he served as the head of vulnerability research from 1999 to 2001, developing one of the industry’s first quantitative vulnerability scoring systems, and co-inventing several patented technologies. Mr. Stracener is an experienced security consultant, penetration tester, and vulnerability researcher. One of his patents, “Interoperability of vulnerability and intrusion detection systems,” was granted by the USPTO in October 2005. Tom has spoken at various conferences including New York Security Conference, ISSA, OWASP, Defcon, and others.&lt;br /&gt;
&lt;br /&gt;
'''How Cybercriminals Steal Money''' by Neil Daswani, Google&lt;br /&gt;
&lt;br /&gt;
This talk discusses how we can prevent cybercrime due to the most significant emerging application security vulnerabilities.  Such vulnerabilities are used to commit various types of wide-scale fraud, and attacks based on them steal money right out of people's bank accounts, capture tens of millions of credit card numbers, and aid in the construction of next-generation botnets.&lt;br /&gt;
&lt;br /&gt;
In the talk, I will present some industry-wide statistics on software security vulnerabilities reported to various databases, and emerging trends in the field of software security.   This talk will then:&lt;br /&gt;
&lt;br /&gt;
* review how attacks such as XSRF (Cross-Site-Request-Forgery), XSSI (Cross-Site-Script-Inclusion), and SQL Injection work,&lt;br /&gt;
* discuss their impact on Web 2.0, AJAX, mashup, and social networking applications,&lt;br /&gt;
* outline how to defend against them, and&lt;br /&gt;
* describe how to modify a software development process to achieve security.&lt;br /&gt;
&lt;br /&gt;
Finally, the talk will discuss the current state of security education, and provide pointers to certification programs, books, and organizations where you and your colleagues can learn more.&lt;br /&gt;
&lt;br /&gt;
Neil Daswani has served in a variety of research , development, teaching, and managerial roles at Google, Stanford University , DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security).  His areas of expertise include security, wireless data technology, and peer-to-peer systems. He has published extensively in these areas, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University.  Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN 1590597842; http://tinyurl.com/33xs6g ) More information about Neil is available at http://www.neildaswani.com/&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
Please RSVP at http://owaspbajune2008.eventbrite.com &lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://garrettgee.com Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;br /&gt;
&lt;br /&gt;
[[Category:California]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=33248</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=33248"/>
				<updated>2008-07-03T01:54:03Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
*2008-06-25&lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043&lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations] | [https://www.owasp.org/index.php/Image:BayArea-June08-Evaluation.Data.zip Evaluation Data]&lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter&lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises&lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery&lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security&lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21&lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588&lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.]&lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:BayArea-June08-Evaluation.Data.zip&amp;diff=33247</id>
		<title>File:BayArea-June08-Evaluation.Data.zip</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:BayArea-June08-Evaluation.Data.zip&amp;diff=33247"/>
				<updated>2008-07-03T01:53:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=33041</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=33041"/>
				<updated>2008-07-02T02:40:03Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
*2008-06-25&lt;br /&gt;
**Location: Microsoft, 1065 La Avenida St, Mountain View, CA 94043&lt;br /&gt;
**[https://www.owasp.org/index.php/Image:OWASP-BayArea-June08.pdf All Presentations]&lt;br /&gt;
**Speaker: Mandeep Khera: Overview of the OWASP Bay Area Chapter&lt;br /&gt;
**Speaker: Dr. Chenxi Wang: Consumerization of enterprises&lt;br /&gt;
**Speaker: Collin Jackson: Cross-Site Request Forgery&lt;br /&gt;
**Speaker: Tom Stracener: Google Gadget Security&lt;br /&gt;
**Speaker: Neil Daswani: How Cybercriminals Steal Money&lt;br /&gt;
&lt;br /&gt;
*2008-02-21&lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588&lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.]&lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP-BayArea-June08.pdf&amp;diff=33038</id>
		<title>File:OWASP-BayArea-June08.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP-BayArea-June08.pdf&amp;diff=33038"/>
				<updated>2008-07-02T02:33:57Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=32146</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=32146"/>
				<updated>2008-06-22T04:50:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''June 25th @ 2PM - Microsoft'''&lt;br /&gt;
   1065 La Avenida St.&lt;br /&gt;
   Mountain View, CA 94043&lt;br /&gt;
   Conference Room - Galileo&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its '''half day Application Security Summit''' at the Microsoft Facility in Mountain View on Wednesday, June 25th. As usual attendance is free and food and beverages will be provided. '''We have some excellent speakers lined up for this and it should be an event not to be missed.''' The event is open to the public. Please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Microsoft for hosting this event and to Cenzic and AppSec Consulting, Rapid7, and Imperva for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   1.30 PM - 2.00 PM ... Check-in and registration&lt;br /&gt;
   2:00 PM - 2:10 PM ... Overview of the OWASP Bay Area Chapter - Mandeep Khera, Bay Area Chapter Leader&lt;br /&gt;
   2:10 PM - 2:55 PM ... Consumerization of enterprises: a security conundrum – Dr. Chenxi Wang, Principal Analyst, Forrester Group&lt;br /&gt;
   2:55 PM - 3:40 PM ... Cross-Site Request Forgery- New Attacks and Defenses - Collin Jackson, PH.D. student, Stanford University&lt;br /&gt;
   3:40 PM - 4:00 PM ... Networking Break&lt;br /&gt;
   4:00 PM - 4.45 PM ... Google Gadget Security - Tom Stracener, Cenzic&lt;br /&gt;
   4:45 PM - 5:30 PM ... How Cybercriminals Steal Money - Neil Daswani, Google &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Consumerization of enterprises: a security conundrum''' by Dr. Chenxi Wang, Principal Analyst, Forrester Group&lt;br /&gt;
&lt;br /&gt;
Dr. Chenxi Wang is a principal analyst with Forrester. She leads Forrester's research in areas including content security, application security, threats and vulnerability management, and software security. Chenxi brings to Forrester years of sophisticated research experience; her previous experience includes a five-year stint as an associate research professor at Carnegie Mellon University, where she published many research papers on network security and distributed systems. &lt;br /&gt;
&lt;br /&gt;
Previously, Chenxi served as the chief scientist for KSR, a managed security service startup in the San Francisco bay area. Chenxi also serves as an investigative forensics expert for the Federal Trade Commission. She is the recipient of a Critical Infrastructure Protection Fellowship from the Army Research Office and the Samuel Alexander Fellowship of ACM for outstanding Ph.D. thesis research.&lt;br /&gt;
&lt;br /&gt;
'''Cross-Site Request Forgery- New Attacks and Defenses''' by Collin Jackson, PH.D. Student, Stanford University&lt;br /&gt;
&lt;br /&gt;
Cross-Site Request Forgery (CSRF) is a widely exploited web site vulnerability, but none of the three major CSRF defenses are satisfactory and many web sites neglect to prevent login CSRF. In a login CSRF attack, an attacker uses the victim's browser to forge a cross-site request to the honest site's login URL, supplying the attacker's user name and password. This forged request can disrupt the integrity of the session and enable theft of confidential information.&lt;br /&gt;
&lt;br /&gt;
Although the HTTP Referer header could be used as an effective general CSRF defense, our experiments indicate that the header is widely blocked at the network layer due to privacy concerns. Our experimental data shows, however, that the header can be used today as a reliable CSRF defense over HTTPS, which is ideal for login CSRF prevention. For the long term, we propose the Origin header, which provides the security beneﬁts of the Referer header while responding to privacy concerns. Additionally, we show that a network attacker can often disrupt session integrity even when the site deploys CSRF defenses, and propose additional defenses against these identity-misbinding attacks.&lt;br /&gt;
&lt;br /&gt;
Collin Jackson is a fourth-year Ph.D. student in Computer Science at Stanford University. His research focuses on browser vulnerabilities, web authentication, mashups, and web application security.&lt;br /&gt;
&lt;br /&gt;
'''Google Gadget Security''' by Tom Stracener,  Sr. Security Analyst, Cenzic&lt;br /&gt;
&lt;br /&gt;
Google Gadgets are HTML and Javascript applications that can be embedded in other web applications or the user's desktop (provided they are using Google Desktop). Gadget code is highly portable and can run on multiple sites or applications with few changes to the underlying code. This talk will focus on gadget security, an area where the current implementation is deeply flawed. We will examine Rsnake's XSS vulnerability in Google gadgets, consider possible attack scenarios, and also look at the reasons why Google chose not to fix this vulnerability. We take a critical look on they ways attackers can exploit the current Gadget implementation when performing attacks. This talk will provide the audience with background information for the upcoming Blackhat 2008 session &amp;quot;Xploiting Google Gadgets: Gmalware and Beyond&amp;quot; by Robert Hansen and Tom Stracener.&lt;br /&gt;
&lt;br /&gt;
Tom is the Senior Security Analyst for Cenzic’s CIA Labs. Mr. Stracener was one of the founding members of nCircle Network Security. While at nCircle he served as the head of vulnerability research from 1999 to 2001, developing one of the industry’s first quantitative vulnerability scoring systems, and co-inventing several patented technologies. Mr. Stracener is an experienced security consultant, penetration tester, and vulnerability researcher. One of his patents, “Interoperability of vulnerability and intrusion detection systems,” was granted by the USPTO in October 2005. Tom has spoken at various conferences including New York Security Conference, ISSA, OWASP, Defcon, and others.&lt;br /&gt;
&lt;br /&gt;
'''How Cybercriminals Steal Money''' by Neil Daswani, Google&lt;br /&gt;
&lt;br /&gt;
This talk discusses how we can prevent cybercrime due to the most significant emerging application security vulnerabilities.  Such vulnerabilities are used to commit various types of wide-scale fraud, and attacks based on them steal money right out of people's bank accounts, capture tens of millions of credit card numbers, and aid in the construction of next-generation botnets.&lt;br /&gt;
&lt;br /&gt;
In the talk, I will present some industry-wide statistics on software security vulnerabilities reported to various databases, and emerging trends in the field of software security.   This talk will then:&lt;br /&gt;
&lt;br /&gt;
* review how attacks such as XSRF (Cross-Site-Request-Forgery), XSSI (Cross-Site-Script-Inclusion), and SQL Injection work,&lt;br /&gt;
* discuss their impact on Web 2.0, AJAX, mashup, and social networking applications,&lt;br /&gt;
* outline how to defend against them, and&lt;br /&gt;
* describe how to modify a software development process to achieve security.&lt;br /&gt;
&lt;br /&gt;
Finally, the talk will discuss the current state of security education, and provide pointers to certification programs, books, and organizations where you and your colleagues can learn more.&lt;br /&gt;
&lt;br /&gt;
Neil Daswani has served in a variety of research , development, teaching, and managerial roles at Google, Stanford University , DoCoMo USA Labs, Yodlee, and Bellcore (now Telcordia Technologies). While at Stanford, Neil co-founded the Stanford Center Professional Development (SCPD) Security Certification Program (http://proed.stanford.edu/?security).  His areas of expertise include security, wireless data technology, and peer-to-peer systems. He has published extensively in these areas, frequently gives talks at industry and academic conferences, and has been granted several U.S. patents. He received a Ph.D. and a master's in computer science from Stanford University, and earned a bachelor's in computer science with honors with distinction from Columbia University.  Neil is also the lead author of &amp;quot;Foundations of Security: What Every Programmer Needs To Know&amp;quot; (published by Apress; ISBN 1590597842; http://tinyurl.com/33xs6g ) More information about Neil is available at http://www.neildaswani.com/&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
Please RSVP at http://owaspbajune2008.eventbrite.com &lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=31939</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=31939"/>
				<updated>2008-06-18T02:24:37Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''June 25th @ 2PM - Microsoft'''&lt;br /&gt;
   1065 La Avenida St.&lt;br /&gt;
   Mountain View, CA 94043&lt;br /&gt;
   Conference Room - Galileo&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its '''half day Application Security Summit''' at the Microsoft Facility in Mountain View on Wednesday, June 25th. As usual attendance is free and food and beverages will be provided. '''We have some excellent speakers lined up for this and it should be an event not to be missed.''' The event is open to the public. Please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Microsoft for hosting this event and to Cenzic and AppSec Consulting, Rapid7, and Imperva for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   1.30 PM - 2.00 PM ... Check-in and registration&lt;br /&gt;
   2:00 PM - 2:10 PM ... Overview of the OWASP Bay Area Chapter - Mandeep Khera, Bay Area Chapter Leader&lt;br /&gt;
   2:10 PM - 2:55 PM ... Consumerization of enterprises: a security conundrum – Dr. Chenxi Wang, Principal Analyst, Forrester Group&lt;br /&gt;
   2:55 PM - 3:40 PM ... Cross-Site Request Forgery- New Attacks and Defenses - Collin Jackson, PH.D. student, Stanford University&lt;br /&gt;
   3:40 PM - 4:00 PM ... Networking Break&lt;br /&gt;
   4:00 PM - 4.45 PM ... Google Gadget Security - Tom Stracener, Cenzic&lt;br /&gt;
   4:45 PM - 5:30 PM ... How Cybercriminals Steal Money - Neil Daswani, Google &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
&lt;br /&gt;
Please RSVP at http://owaspbajune2008.eventbrite.com &lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=31938</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=31938"/>
				<updated>2008-06-18T02:24:22Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''June 25th @ 2PM - Microsoft'''&lt;br /&gt;
   1065 La Avenida St.&lt;br /&gt;
   Mountain View, CA 94043&lt;br /&gt;
   Conference Room - Galileo&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its '''half day Application Security Summit''' at the Microsoft Facility in Mountain View on Wednesday, June 25th. As usual attendance is free and food and beverages will be provided. '''We have some excellent speakers lined up for this and it should be an event not to be missed.''' The event is open to the public. Please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Microsoft for hosting this event and to Cenzic and AppSec Consulting, Rapid7, and Imperva for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   1.30 PM - 2.00 PM ... Check-in and registration&lt;br /&gt;
   2:00 PM - 2:10 PM ... Overview of the OWASP Bay Area Chapter - Mandeep Khera, Bay Area Chapter Leader&lt;br /&gt;
   2:10 PM - 2:55 PM ... Consumerization of enterprises: a security conundrum – Dr. Chenxi Wang, Principal Analyst, Forrester Group&lt;br /&gt;
   2:55 PM - 3:40 PM ... Cross-Site Request Forgery- New Attacks and Defenses - Collin Jackson, PH.D. student, Stanford University&lt;br /&gt;
   3:40 PM - 4:00 PM ... Networking Break&lt;br /&gt;
   4:00 PM - 4.45 PM ... Google Gadget Security - Tom Stracener, Cenzic&lt;br /&gt;
   4:45 PM - 5:30 PM ... How Cybercriminals Steal Money - Neil Daswani, Google &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
Please RSVP at http://owaspbajune2008.eventbrite.com &lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=31937</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=31937"/>
				<updated>2008-06-18T02:22:27Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''June 25th @ 2PM - Microsoft'''&lt;br /&gt;
   1065 La Avenida St.&lt;br /&gt;
   Mountain View, CA 94043&lt;br /&gt;
   Conference Room - Galileo&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its '''half day Application Security Summit''' at the Microsoft Facility in Mountain View on Wednesday, June 25th. As usual attendance is free and food and beverages will be provided. '''We have some excellent speakers lined up for this and it should be an event not to be missed.''' The event is open to the public. Please forward this invite to your colleagues and friends who are interested in computer and application security.&lt;br /&gt;
&lt;br /&gt;
Special thanks to Microsoft for hosting this event and to Cenzic and AppSec Consulting, Rapid7, and Imperva for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.''' - [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures''' - [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
'''REGISTER EARLY AS SEATING IS LIMITED'''&lt;br /&gt;
Please RSVP at http://owaspbajune2008.eventbrite.com &lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25937</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25937"/>
				<updated>2008-02-24T19:05:19Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic and AppSec Consulting for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.''' - [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures''' - [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay Area Past Events]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=25936</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=25936"/>
				<updated>2008-02-24T19:04:36Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is at [[Bay Area]]. &lt;br /&gt;
&lt;br /&gt;
*2008-02-21&lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588&lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.]&lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=25935</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=25935"/>
				<updated>2008-02-24T19:03:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is here. &lt;br /&gt;
&lt;br /&gt;
*2008-02-21&lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588&lt;br /&gt;
**Speaker: Kurt Grutzmacher: [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf Your Client-Side Security Sucks. Stop Using It.]&lt;br /&gt;
**Speaker: Eric Rachner: [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf NTLM attacks and countermeasures]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=25934</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=25934"/>
				<updated>2008-02-24T19:02:39Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is here. &lt;br /&gt;
&lt;br /&gt;
*2008-02-21&lt;br /&gt;
**Location: Robert Half International, 5720 Stoneridge Dr, Pleasanton CA 94588&lt;br /&gt;
**Speaker: Kurt Grutzmacher: Your Client-Side Security Sucks. Stop Using It. - [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf slides]&lt;br /&gt;
**Speaker: Eric Rachner: NTLM attacks and countermeasures - [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf slides]&lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=25933</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=25933"/>
				<updated>2008-02-24T19:00:45Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is here. &lt;br /&gt;
&lt;br /&gt;
*2008-01-24&lt;br /&gt;
**Location: PG&amp;amp;E,245 Market Street, San Francisco, CA  94105&lt;br /&gt;
**Speaker: Erick Lee, Adobe Systems: Securing Flash® &amp;amp; Flex® Applications&lt;br /&gt;
**Speaker: Jim Cowing, Digital Resource Group: Application Security and PCI Compliance&lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=San_Jose&amp;diff=25932</id>
		<title>San Jose</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=San_Jose&amp;diff=25932"/>
				<updated>2008-02-24T18:54:00Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: Redirecting to Bay Area&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Bay Area]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=San_Francisco&amp;diff=25931</id>
		<title>San Francisco</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=San_Francisco&amp;diff=25931"/>
				<updated>2008-02-24T18:53:03Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: Redirecting to Bay Area&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Bay Area]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25929</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25929"/>
				<updated>2008-02-24T18:51:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: San Francisco Bay Area moved to Bay Area&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic and AppSec Consulting for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.''' - [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures''' - [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay_Area_Past_Events]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=San_Francisco_Bay_Area&amp;diff=25930</id>
		<title>San Francisco Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=San_Francisco_Bay_Area&amp;diff=25930"/>
				<updated>2008-02-24T18:51:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: San Francisco Bay Area moved to Bay Area&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[Bay Area]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25928</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25928"/>
				<updated>2008-02-24T18:51:10Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic and AppSec Consulting for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.''' - [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures''' - [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay_Area_Past_Events]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=San_Jose&amp;diff=25927</id>
		<title>San Jose</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=San_Jose&amp;diff=25927"/>
				<updated>2008-02-24T18:49:48Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: Redirecting to San Francisco Bay Area&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[San Francisco Bay Area]]&lt;br /&gt;
&lt;br /&gt;
{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=San_Jose&amp;diff=25926</id>
		<title>San Jose</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=San_Jose&amp;diff=25926"/>
				<updated>2008-02-24T18:47:20Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: Redirecting to San Francisco Bay Area&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;#REDIRECT [[San Francisco Bay Area]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25925</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25925"/>
				<updated>2008-02-24T18:46:01Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic and AppSec Consulting for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.''' - [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures''' - [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;br /&gt;
&lt;br /&gt;
=Bay Area Past Events=&lt;br /&gt;
[[Bay_Area_Past_Events]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=25924</id>
		<title>Bay Area Past Events</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area_Past_Events&amp;diff=25924"/>
				<updated>2008-02-24T18:44:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: New page: This is an archive page of all the Bay Area OWASP past events. The chapter home is here.   *2007-12-13 **Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanfor...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This is an archive page of all the Bay Area OWASP past events. The chapter home is here. &lt;br /&gt;
&lt;br /&gt;
*2007-12-13&lt;br /&gt;
**Location: Stanford University Alumni Association Center, 326 Galvez Street, Stanford, CA  94305&lt;br /&gt;
**Speaker: Niels Provos, Google: Ghosts in the Browser&amp;lt;br/&amp;gt;&lt;br /&gt;
**Speaker: Adam Barth &amp;amp; Collin Jackson, Stanford University: Ph.D. Student Presentations&amp;lt;br/&amp;gt;&lt;br /&gt;
**Sponsors: Cenzic and AppSec Consulting&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25923</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25923"/>
				<updated>2008-02-24T18:37:08Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic and AppSec Consulting for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.''' - [https://www.owasp.org/index.php/Image:Your_Client_Security_Sucks_-_OWASP.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures''' - [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Your_Client_Security_Sucks_-_OWASP.pdf&amp;diff=25922</id>
		<title>File:Your Client Security Sucks - OWASP.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Your_Client_Security_Sucks_-_OWASP.pdf&amp;diff=25922"/>
				<updated>2008-02-24T18:36:14Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25921</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25921"/>
				<updated>2008-02-24T18:34:44Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic and AppSec Consulting for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.''' - &lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures''' - [https://www.owasp.org/index.php/Image:NTLM_Relay_Attacks.pdf slides]&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:NTLM_Relay_Attacks.pdf&amp;diff=25881</id>
		<title>File:NTLM Relay Attacks.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:NTLM_Relay_Attacks.pdf&amp;diff=25881"/>
				<updated>2008-02-23T07:27:22Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25722</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25722"/>
				<updated>2008-02-21T18:21:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic and AppSec Consulting for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25465</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25465"/>
				<updated>2008-02-15T21:53:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*[http://ggee.org Garrett Gee]&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25450</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25450"/>
				<updated>2008-02-15T18:14:40Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: Undo revision 25449 by Ggee (Talk)&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*Garrett Gee&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25449</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25449"/>
				<updated>2008-02-15T18:13:53Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: Replacing page with '{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bay...'&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
#redirect [[Bay Area]]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Talk:Bay_Area&amp;diff=25448</id>
		<title>Talk:Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Talk:Bay_Area&amp;diff=25448"/>
				<updated>2008-02-15T18:13:06Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: New page: {{Chapter Template|chaptername=Bay Area|extra= |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}  =Next ...&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Bay Area|extra= |mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*Garrett Gee&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25447</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25447"/>
				<updated>2008-02-15T18:04:32Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Eric will demonstrate the NTLM relay attack, in which an attacker accesses arbitrary web sites and file shares using the credentials of any user who can be lured into visiting the attacker's web site. Since NTLM is enabled by default as part of the Windows integrated authentication protocol suite, this attack is a potential concern in any enterprise where Windows is widely used.  Following the demonstration, we will explore the history and mechanics of the attack, as well as mitigation options. &lt;br /&gt;
&lt;br /&gt;
Bio: Eric Rachner is a security researcher and lead consultant specializing in threat analysis, vulnerability assessment and penetrating testing of complex mission critical applications and systems.  Mr. Rachner began his career in IT at Microsoft in 1994.  As a senior member of Microsoft's Security Team, Eric led several projects including application penetration testing, code reviews, design reviews and security awareness training for internal application teams throughout Microsoft's global IT organization. In 2005, Eric became an independent security consultant and researcher providing services to large global enterprises in North America and Europe.  Away from the office Eric has many hobbies; he also participated as a core member of the hacking team that won the prestigious &amp;quot;Capture the Flag&amp;quot; contest at Def Con three years in a row. &lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*Garrett Gee&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25408</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25408"/>
				<updated>2008-02-15T04:33:50Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
==Date and Location==&lt;br /&gt;
   '''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
   5720 Stoneridge Dr&lt;br /&gt;
   Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic for sponsoring.&lt;br /&gt;
&lt;br /&gt;
==Agenda==&lt;br /&gt;
   6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
   6:30pm - 7:15pm ... '''Your Client-Side Security Sucks. Stop Using It.''' – Kurt Grutzmacher&lt;br /&gt;
   7:15pm - 8:00pm ... '''NTLM attacks and countermeasures''' – Eric Rachner&lt;br /&gt;
   8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
==Speakers==&lt;br /&gt;
'''Your Client-Side Security Sucks. Stop Using It.'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
Abstract: Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
Bio: Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping&lt;br /&gt;
they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
'''NTLM attacks and countermeasures'''&lt;br /&gt;
&lt;br /&gt;
Presented by: Eric Rachner&lt;br /&gt;
&lt;br /&gt;
Abstract: Coming soon.&lt;br /&gt;
&lt;br /&gt;
Bio: Coming soon.&lt;br /&gt;
&lt;br /&gt;
==RSVP==&lt;br /&gt;
Please RSVP at http://owaspfeb2008.eventbrite.com&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*Garrett Gee&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25407</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25407"/>
				<updated>2008-02-15T04:17:23Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=SF Bay Area|extra=|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-bayarea|emailarchives=http://lists.owasp.org/pipermail/owasp-bayarea}}&lt;br /&gt;
&lt;br /&gt;
=Next Event=&lt;br /&gt;
&lt;br /&gt;
'''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
'''Agenda and Presentations:'''&lt;br /&gt;
&lt;br /&gt;
6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
&lt;br /&gt;
6:30pm - 7:15pm ... ''Your Client-Side Security Sucks. Stop Using It.'' – Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
7:15pm - 8:00pm ... ''NTLM attacks and countermeasures'' – Eric Rachner&lt;br /&gt;
&lt;br /&gt;
8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Venue:'''&lt;br /&gt;
Robert Half International&lt;br /&gt;
5720 Stoneridge Dr&lt;br /&gt;
Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
''Your Client-Side Security Sucks. Stop Using It.''&lt;br /&gt;
&lt;br /&gt;
'''Presented by:''' Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping&lt;br /&gt;
they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
''NTLM attacks and countermeasures''&lt;br /&gt;
&lt;br /&gt;
'''Presented by:''' Eric Rachner&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  Coming soon.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Coming soon.&lt;br /&gt;
&lt;br /&gt;
Please RSVP by responding to this email or visit ''http://owaspfeb2008.eventbrite.com''&lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic for sponsoring.&lt;br /&gt;
&lt;br /&gt;
=Bay Area Chapter Leaders=&lt;br /&gt;
*[mailto:brian@appsecconsulting.com Brian Bertacini]&lt;br /&gt;
*Garrett Gee&lt;br /&gt;
*[mailto:mandeep@cenzic.com Mandeep Khera]&lt;br /&gt;
*[mailto:robipapp@yahoo.com Robi Papp]&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25406</id>
		<title>Bay Area</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Bay_Area&amp;diff=25406"/>
				<updated>2008-02-15T04:07:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ggee: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=San Francisco|extra=The chapter leader is [mailto:robipapp@yahoo.com Robi Papp]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-sanfran|emailarchives=http://lists.owasp.org/pipermail/owasp-sanfran}}&lt;br /&gt;
&lt;br /&gt;
NEXT EVENT:&lt;br /&gt;
&lt;br /&gt;
'''February, 21st @ 6PM - Robert Half International'''&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
OWASP Bay Area will host its next meeting at the Robert Half International on Thursday, February 21.  As usual attendance is free and food and beverages will be provided.  This will be an awesome event and a great opportunity to network with industry peers.  The event is open to the public; please forward this invite to your colleagues and friends who are interested in computer and application security.  &lt;br /&gt;
&lt;br /&gt;
'''Agenda and Presentations:'''&lt;br /&gt;
&lt;br /&gt;
6:00pm - 6:30pm ... Check-in and Reception (food &amp;amp; beverages)&lt;br /&gt;
&lt;br /&gt;
6:30pm - 7:15pm ... ''Your Client-Side Security Sucks. Stop Using It.'' – Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
7:15pm - 8:00pm ... ''NTLM attacks and countermeasures'' – Eric Rachner&lt;br /&gt;
&lt;br /&gt;
8:00pm - 8:30pm ... Networking Session &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Venue:'''&lt;br /&gt;
Robert Half International&lt;br /&gt;
5720 Stoneridge Dr&lt;br /&gt;
Pleasanton CA 94588&lt;br /&gt;
&lt;br /&gt;
''Your Client-Side Security Sucks. Stop Using It.''&lt;br /&gt;
&lt;br /&gt;
'''Presented by:''' Kurt Grutzmacher&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  Browser-based security has been used for many years to 'protect' back-end systems from attack or to enhance the user experience. This should not be your only protection and can even open your application to business logic flaws that scanning tools can not detect nor report upon! This talk will show some real world examples of client-side security and the failures they introduced. Business logic flaws such as the MacWorld Expo Platinum Pass will be examined in depth.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Kurt Grutzmacher has been performing Penetration Testing for a &amp;quot;very large financial institution&amp;quot; for nearly a decade and recently moved to a &amp;quot;very large utility company&amp;quot; to start their internal testing program. For two years in a row he has exposed the methods required to obtain free Platinum Passes to MacWorld and is hoping&lt;br /&gt;
they'll get it right the third time, he's tired of explaining it to them. Kurt contributes to the Metasploit project occasionally and is currently working on enhancing the project's support for NTLM in web-based attacks. He also randomly blogs at http://grutztopia.jingojango.net/ -- very randomly.&lt;br /&gt;
&lt;br /&gt;
''NTLM attacks and countermeasures''&lt;br /&gt;
&lt;br /&gt;
'''Presented by:''' Eric Rachner&lt;br /&gt;
&lt;br /&gt;
'''Abstract:'''  Coming soon.&lt;br /&gt;
&lt;br /&gt;
'''Bio:''' Coming soon.&lt;br /&gt;
&lt;br /&gt;
Please RSVP by responding to this email or visit ''http://owaspfeb2008.eventbrite.com''&lt;br /&gt;
&lt;br /&gt;
Special thanks to Robert Half International for hosting this event and to Cenzic for sponsoring.&lt;/div&gt;</summary>
		<author><name>Ggee</name></author>	</entry>

	</feed>