<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ivanr</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Ivanr"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Ivanr"/>
		<updated>2026-05-03T19:01:13Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden&amp;diff=85300</id>
		<title>OWASP AppSec Research 2010 - Stockholm, Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden&amp;diff=85300"/>
				<updated>2010-06-23T12:43:48Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
== Invitation  ==&lt;br /&gt;
&lt;br /&gt;
Ladies and Gentlemen, &lt;br /&gt;
&lt;br /&gt;
In June 21-24, 2010 let's all meet in beautiful Stockholm, Sweden. The OWASP chapters in [http://www.owasp.org/index.php/Sweden Sweden], [http://www.owasp.org/index.php/Norway Norway], and [http://www.owasp.org/index.php/Denmark Denmark] hereby invite you to OWASP AppSec Research 2010. &lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email the conference chair: john.wilander at owasp.org &lt;br /&gt;
&lt;br /&gt;
[[Image:Stockholm old town small.jpg]] &lt;br /&gt;
&lt;br /&gt;
=== Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
Diamond sponsor:&amp;lt;br&amp;gt; [[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg]] &lt;br /&gt;
&lt;br /&gt;
Gold sponsors:&amp;lt;br&amp;gt; [[Image:Cybercom logo.png]] [[Image:Portwise logo.png]]&amp;lt;br&amp;gt; [[Image:Fortify logo AppSec Research 2010.png]] [[Image:Omegapoint logo.png]] &lt;br /&gt;
&lt;br /&gt;
Silver sponsors:&amp;lt;br&amp;gt; [[Image:Mnemonic logo.png]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg]] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.hps.se/ http://www.owasp.org/images/6/6f/Hps_logo.png] [[Image:AppSec Research 2010 sponsor F5 logo.jpg]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 sponsor Imperva logo.jpg]] [[Image:AppSec_Research_2010_sponsor_Promon_logo.jpg]]‎ &lt;br /&gt;
&lt;br /&gt;
Dinner Party sponsor:&amp;lt;br&amp;gt; [http://www.google.com/EngineeringEMEA http://www.owasp.org/images/thumb/8/86/AppSec_Research_2010_Google_20k_sponsor.jpg/150px-AppSec_Research_2010_Google_20k_sponsor.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lunch sponsors (1 taken, 1 open):&amp;lt;br&amp;gt; [[Image:IIS logo.png]] &lt;br /&gt;
&lt;br /&gt;
Coffee break sponsors (1 taken, 3 open):&amp;lt;br&amp;gt; [[Image:MyNethouse logo.png]] &lt;br /&gt;
&lt;br /&gt;
Media sponsors:&amp;lt;br&amp;gt; [[Image:AppSec Research 2010 Help Net Security sponsor.jpg]] &lt;br /&gt;
&lt;br /&gt;
Notepad sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:TrustwaveLogo.jpg|Trustwave - Notepad sponsor]]&lt;br /&gt;
&lt;br /&gt;
For full sponsoring program see the Sponsoring tab above.&lt;br /&gt;
&lt;br /&gt;
=== &amp;quot;AppSec Research&amp;quot;.equals(&amp;quot;AppSec Europe&amp;quot;)  ===&lt;br /&gt;
&lt;br /&gt;
This conference was formerly known as OWASP AppSec Europe. We have added 'Research' to highlight that we invite both industry and academia. All the regular AppSec Europe visitors and topics are welcome along with contributions from universities and research institutes. &lt;br /&gt;
&lt;br /&gt;
This will be ''the'' European conference for anyone interested in or working with application security. Co-host is the [http://dsv.su.se/en/ Department of Computer and Systems Science] at Stockholm University, offering a great venue in the fabulous Aula Magna. &lt;br /&gt;
&lt;br /&gt;
=== Countdown Challenges -- Free Tickets to Win!  ===&lt;br /&gt;
&lt;br /&gt;
There will be a challenge posted on the conference wiki page the 21st every month up until the event. The winner will get free entrance to the conference. What are you waiting for? Go to the Challenges tab and have fun! &lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
• John Wilander, chapter leader Sweden (chair)&amp;lt;br&amp;gt; • Mattias Bergling (vice chair)&amp;lt;br&amp;gt; • Alan Davidson, Stockholm University/Royal Institute of Technology (co-host)&amp;lt;br&amp;gt; • Ulf Munkedal, chapter leader Denmark&amp;lt;br&amp;gt; • Kåre Presttun, chapter leader Norway&amp;lt;br&amp;gt; • Stefan Pettersson (sponsoring coordinator)&amp;lt;br&amp;gt; • Carl-Johan Bostorp (schedule and event coordinator)&amp;lt;br&amp;gt; • Martin Holst Swende (coffee/lunch/dinner)&amp;lt;br&amp;gt; • Michael Boman (conference guide/attendee pack)&amp;lt;br&amp;gt; • Predrag Mitrovic, OWASP Sweden Board&amp;lt;br&amp;gt; • Kate Hartmann, OWASP&amp;lt;br&amp;gt; • Sebastien Deleersnyder, OWASP Board &lt;br /&gt;
&lt;br /&gt;
'''Welcome to Stockholm this year!'''&amp;lt;br&amp;gt; Regards, John Wilander &lt;br /&gt;
&lt;br /&gt;
==== June 21-22 (Training)  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
10:30-10:50 Coffee break&amp;lt;br&amp;gt;&lt;br /&gt;
12:15-13:00 Lunch in the canteen&amp;lt;br&amp;gt;&lt;br /&gt;
15:00-15:20 Coffee break&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
17:00 End of training for the day&lt;br /&gt;
&lt;br /&gt;
18:00 Monday we'll just go somewhere to eat, Tuesday we have the official meet up at &amp;quot;Mosebacke&amp;quot;. Check the &amp;quot;Social Events&amp;quot; tab above.&lt;br /&gt;
&lt;br /&gt;
== Training Registration is closed  ==&lt;br /&gt;
&lt;br /&gt;
Application security training is given the first two days, '''June 21-22'''. The price was '''€990''' (~$1.350) for a two-day course. 65 people took the chance to learn from the best!&lt;br /&gt;
&lt;br /&gt;
=== Course 1: Threat Modeling and Architecture Review (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Pravir Chandra.jpg]] &lt;br /&gt;
&lt;br /&gt;
Pravir Chandra, Fortify Software &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Threat Modeling and Architecture Review are the cornerstones of a preventative approach to Application Security. By combining these topics into single comprehensive course attendees can get a complete understanding of how to understand the threat an application faces and how the application will handle those potential threats. This enables the risk to be accurately assessed and appropriate changes or mitigating controls recommended. From the course outline:&lt;br /&gt;
&lt;br /&gt;
1. Overview&lt;br /&gt;
* Scope and problem definition&lt;br /&gt;
* High‐level view of the overall process&lt;br /&gt;
* Core techniques&lt;br /&gt;
2. Threat assessment and modeling&lt;br /&gt;
* Overall threat modeling process&lt;br /&gt;
* Preparation and background information&lt;br /&gt;
* Capturing business and security goals&lt;br /&gt;
* Identify vulnerabilities and other risks&lt;br /&gt;
* Establish weighting and prioritization of risks&lt;br /&gt;
* Guard against risks with compensating controls&lt;br /&gt;
* EXERCISE  -  Threat model a real‐life problem&lt;br /&gt;
3. Architecture review techniques&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
* EXERCISE  - Apply the techniques from Authentication and Authorization&lt;br /&gt;
* Input validation&lt;br /&gt;
* Output encoding&lt;br /&gt;
* EXERCISE - Apply the techniques from Input Validation and Output Encoding&lt;br /&gt;
* Error handling&lt;br /&gt;
* Audit logging&lt;br /&gt;
* EXERCISE - Apply the techniques from Error Handling and Audit Logging&lt;br /&gt;
* Encryption&lt;br /&gt;
* Configuration management&lt;br /&gt;
* EXERCISE - Apply the techniques from Encryption and Configuration Management&lt;br /&gt;
4. Specifying security requirements&lt;br /&gt;
* Writing positive security requirements&lt;br /&gt;
* Deriving security requirements from functional requirements&lt;br /&gt;
* Thinking broadly about requirements coverage&lt;br /&gt;
* Balancing security requirements with functionality&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Pravir Chandra is Director of Strategic Services at Fortify where he works with clients to build and optimize software security assurance programs. Pravir is widely recognized in the industry for his expertise in software security and code analysis, and also for his ability to apply technical knowledge strategically from a business perspective. His book, Network Security with OpenSSL is a popular reference on protecting software applications through cryptography and secure communications. His varied special project experience includes creating and leading the Open Software Assurance Maturity Model (OpenSAMM) project &lt;br /&gt;
&lt;br /&gt;
=== Course 2: Introduction to Malware Analysis (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Jason Geffner.jpg]] &lt;br /&gt;
&lt;br /&gt;
Jason Geffner, Next Generation Security Software (NGS), and Scott Lambert, Microsoft &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Security researchers are facing a growing problem in the complexity of malicious executables. While dynamic black-box automation tools exist to discover what malware will do on a given execution, it is often important for an analyst to know the full capabilities of a given malware sample. What port does it listen on? What password does it expect for backdoor access? What files will it write to? What will it do tomorrow that it didn't do today? This class will focus on teaching attendees the steps required to understand the functionality of given malware samples. This is a hands-on course. Attendees will work on real-world malware through a series of lab exercises designed to build their expertise in understanding the analysis process. &lt;br /&gt;
&lt;br /&gt;
Learning Objectives: &lt;br /&gt;
&lt;br /&gt;
*An understanding of how to use reverse engineering tools &lt;br /&gt;
*An understanding of low-level code and data flow &lt;br /&gt;
*PE File format &lt;br /&gt;
*x86 Assembly language &lt;br /&gt;
*API functions often used by malware &lt;br /&gt;
*Anti-analysis tricks and how to defeat them &lt;br /&gt;
*Exploits and Shellcode &lt;br /&gt;
*A methodology for analyzing malware with and without the use of specialized tools&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Jason Geffner joined Next Generation Security Software Ltd. in June of 2007 as a Principal Security Consultant. Jason focuses on performing security reviews of source code and designs, reverse engineering software protection methods and DRM protection methods, deobfuscating and analyzing malware, penetration testing web applications and network infrastructures, and developing automated security analysis tools. &lt;br /&gt;
&lt;br /&gt;
=== Course 3: Building Secure Ajax and Web 2.0 Applications (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Dave Wichers.jpg]] &lt;br /&gt;
&lt;br /&gt;
Dave Wichers, Aspect Security &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This course addresses the special issues with this type of application development. Students will gain hands-on testing experience with freely available web application security test tools to find and diagnose such flaws and learn how to identify, fix, and avoid them in their own projects. In addition, Aspect’s engineers are leaders in the AppSec Community and will offer the students an amazing perspective.&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Dave Wichers is a member of the OWASP Board and a coauthor, along with Jeff Williams, of all previous versions of the OWASP Top Ten. Dave is also the Chief Operating Officer of Aspect Security, a company that specializes in application security services. Mr. Wichers brings over twenty years of experience in the information security field. Prior to cofounding Aspect, he ran the Application Security Services Group at a large data center company, Exodus Communications. His current work involves helping customers, from small e-commerce sites to Fortune 500 corporations and the U.S. Government, secure their applications by providing application security design, architecture, and SDLC support services: including code review, application penetration testing, security policy development, security consulting services, and developer training. &lt;br /&gt;
&lt;br /&gt;
=== Course 4: Assessing and Exploiting Web Apps with Samurai-WTF (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Justin Searle.jpg]] &lt;br /&gt;
&lt;br /&gt;
Justin Searle, InGuardians &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': This course will focus on using open source tools to perform web application assessments. The course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-WTF). Day one will take students through the steps and open source tools used to assess applications for vulnerabilities. Day two will focus on the exploitation of web app vulnerabilities, spending half the day on server side attacks and the other half of the day on client side attacks. The latest tools and techniques will be use throughout the course, including several tools developed by the trainers themselves. From the course outline:&lt;br /&gt;
&lt;br /&gt;
Samurai-WTF Project and Distribution (about, using ...)&amp;lt;br&amp;gt;&lt;br /&gt;
Web Application Assessment Methodology (pentest types, four step methodology ...)&amp;lt;br&amp;gt;&lt;br /&gt;
Step 1: Reconnaissance&lt;br /&gt;
* Overview of Web Application Recon&lt;br /&gt;
* Domain and IP Registration Databases  (Labs: whois)&lt;br /&gt;
* Google Hacking  (Labs: gooscan, gpscan)&lt;br /&gt;
* Social Networks  (Labs: Reconnoiter)&lt;br /&gt;
* DNS Interrogation  (Labs: host, dig, nslookup, fierce)&lt;br /&gt;
Step 2: Mapping&lt;br /&gt;
* Overview of Mapping&lt;br /&gt;
* Port Scanning and Fingerprinting  (Labs: nmap, zenmap, Yokoso!)&lt;br /&gt;
* Web Service Scanning  (Labs: Nikto)&lt;br /&gt;
* Spidering  (Labs: wget, curl, Paros, WebScarab, BurpSuite)&lt;br /&gt;
* Discovering &amp;quot;Non-Discoverable&amp;quot; URLs  (Labs: DirBuster)&lt;br /&gt;
Step 3: Discovery&lt;br /&gt;
* Using Built-in Tools  (Labs: Page Info, Error Console, DOM Inspector, View Source)&lt;br /&gt;
* Poking and Prodding  (Labs: Default User Agent, Cookie Editor, Tamper Data)&lt;br /&gt;
* Interception Proxies  (Labs: Paros, WebScarab, BurpSuite)&lt;br /&gt;
* Semi-Automated Discovery  (Labs: RatProxy)&lt;br /&gt;
* Automated Discovery  (Labs: Grendel-Scan, w3af)&lt;br /&gt;
* Information Discovery  (Labs: CeWL)&lt;br /&gt;
* Fuzzing  (Labs: JBroFuzz, BurpIntruder)&lt;br /&gt;
* Finding XSS  (Labs: TamperData, XSS-Me, BurpIntruder)&lt;br /&gt;
* Finding SQL Injection  (Labs: SQL Inject-Me, SQL Injection, BurpIntruder)&lt;br /&gt;
* Decompiling Flash Objects  (Labs: Flare)&lt;br /&gt;
Step 4: Exploitation&lt;br /&gt;
* Username Harvesting  (Labs: python)&lt;br /&gt;
* Brute Forcing Passwords  (Labs: python)&lt;br /&gt;
* Command Injection  (Labs: w3af)&lt;br /&gt;
* Exploiting SQL Injection  (Labs: SQLMap, SQLNinja, Laudanum)&lt;br /&gt;
* Exploiting XSS  (Labs: Durzosploit)&lt;br /&gt;
* Browser Exploitation  (Labs: BeEF, BrowserRider, Yokoso!)&lt;br /&gt;
* Advanced exploitation through tool integration (MSF + sqlninga/sqlmap/BeEF)&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Justin Searle, a Senior Security Analyst with InGuardians, specializes in web application, network, and embedded penetration testing. Justin has presented at top security conferences including DEFCON, ToorCon, ShmooCon, and SANS. Justin has an MBA in International Technology and is CISSP and SANS GIAC-certified in incident handling and hacker techniques (GCIH) and intrusion analysis (GCIA). Justin is one of the founders and lead developers of Samurai-WTF. &lt;br /&gt;
&lt;br /&gt;
=== Course 5: Securing Web Services (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Jason Li.jpg]] &lt;br /&gt;
&lt;br /&gt;
Jason Li, Aspect Security &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Aspect Security offers this two day Securing Web Services course which focuses on the most important messages regarding the development of secure web services. This course helps developers understand the real risks associated with Security in Web Services and Service Oriented Architectures, what standard are available to help, and how to use the standards. The course includes a combination of lecture, demonstrations, and hands on testing designed to provide detailed guidance regarding the implementation of specific security principles and functions in web services.&lt;br /&gt;
&lt;br /&gt;
From the course outline:&lt;br /&gt;
&lt;br /&gt;
* Web Service and SOA Threat Model&lt;br /&gt;
* Data Formats: XML, JSON&lt;br /&gt;
* Protocols: SOAP, REST&lt;br /&gt;
* Overview of the Standards (WS-Security, SAML, XACML)&lt;br /&gt;
* Common Communications Vulnerabilities&lt;br /&gt;
* Using SSL for Simple Web Services&lt;br /&gt;
* XML Encryption&lt;br /&gt;
* XML Signature&lt;br /&gt;
* WS-Security&lt;br /&gt;
* How to Manage Web Service Identities&lt;br /&gt;
* Federated Identities&lt;br /&gt;
* Common Authentication Vulnerabilities&lt;br /&gt;
* WSDL Examples of Implementing WS-Security&lt;br /&gt;
* Common Access Control Vulnerabilities&lt;br /&gt;
* How to Validate Web Service Input (XML Schema, Business Logic Validation)&lt;br /&gt;
* Common XML Attacks (Recursion, References, Overflow, Transforms)&lt;br /&gt;
* State Management&lt;br /&gt;
* Using Interpreters Safely (SQL Injection, LDAP Injection, Command Injection, XPath Injection)&lt;br /&gt;
* Denial of Service and Availability&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Jason Li is a Senior Application Security Engineer for Aspect Security where he performs application security assessments and architecture reviews, as well as application security training, to a wide variety of financial and government customers. Jason is an active OWASP leader, contributing to several OWASP projects and serving on the OWASP Global Projects Committee. He holds a Post-Masters certificate in Computer Science and concentration in Information Security from Johns Hopkins University and a Masters degree in Computer Science from Cornell University. &lt;br /&gt;
&lt;br /&gt;
==== June 23  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - June 23, 2010''' &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] = Research paper [[Image:OWASP AppSec Research 2010 Demo D.gif]] = Demo [[Image:OWASP AppSec Research 2010 Presentation P.gif]] = Presentation &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-08:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:50-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec Research 2010 Conference (John Wilander &amp;amp;amp; [http://www.owasp.org/index.php/About_OWASP OWASP Global Board Members])&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | [[#Keynote: Cross-Domain Theft and the Future of Browser Security]] &lt;br /&gt;
''Chris Evans, Information Security Engineer, and Ian Fette, Product Manager for Chrome Security, Google'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:45 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#BitFlip: Determine a Data's Signature Coverage from Within the Application]] &lt;br /&gt;
''Henrich Christopher Poehls, University of Passau''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#CsFire: Browser-Enforced Mitigation Against CSRF]] &lt;br /&gt;
''Lieven&amp;amp;nbsp;Desmet&amp;amp;nbsp;and&amp;amp;nbsp;Philippe&amp;amp;nbsp;De&amp;amp;nbsp;Ryck,&amp;amp;nbsp;Katholieke Universiteit Leuven''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Deconstructing ColdFusion]] &lt;br /&gt;
''Chris Eng,&amp;amp;nbsp;Veracode'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:45-11:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off, '''Coffee break sponsoring position open''' ($2,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:10-11:45 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Towards Building Secure Web Mashups]] &lt;br /&gt;
''M Decat, P De Ryck, L Desmet, F Piessens, W Joosen,&amp;amp;nbsp;Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#New Insights into Clickjacking]] &lt;br /&gt;
''Marco Balduzzi,&amp;amp;nbsp;Eurecom&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#How to Render SSL Useless]] ([[Media:Ivan_Ristic_-_Breaking_SSL_-_OWASP.pdf|PDF]])&lt;br /&gt;
''Ivan Ristic, Qualys&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:55-12:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Busting Frame Busting]] &lt;br /&gt;
&lt;br /&gt;
''Gustav Rydstedt,&amp;amp;nbsp;Stanford Web Security Research''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Web Frameworks and How They Kill Traditional Security Scanning]] &lt;br /&gt;
''Christian Hang and Lars Andren,&amp;amp;nbsp;Armorize Technologies'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#The State of SSL in the World]] &lt;br /&gt;
''Michael Boman, Omegapoint&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:30-13:45 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF, Lunch sponsor: [[Image:OWASP AppSec Research 2010 IIS logo for program.png]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:45-14:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#(New) Object Capabilities and Isolation of Untrusted Web Applications]] &lt;br /&gt;
''Sergio Maffeis, Imperial College, London'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Beyond the Same-Origin Policy]] &lt;br /&gt;
''Jasvir Nagra and Mike Samuel, Google&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#SmashFileFuzzer - a New File Fuzzer Tool]] &lt;br /&gt;
''Komal Randive, Symantec'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:30-15:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Security Toolbox for .NET Development and Testing]] &lt;br /&gt;
''Johan Lindfors and Dag König, Microsoft'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Cross-Site Location Jacking (XSLJ) (not really)]] &lt;br /&gt;
''David Lindsay, Cigital&amp;lt;br&amp;gt;Eduardo Vela Nava,&amp;amp;nbsp;sla.ckers.org''&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Owning Oracle: Sessions and Credentials]] &lt;br /&gt;
''Wendel G. Henrique and Steve Ocepek, Trustwave'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:05-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF, '''Coffee break sponsoring position open''' ($2,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Value Objects a la Domain-Driven Security: A Design Mindset to Avoid SQL Injection and Cross-Site Scripting]] &lt;br /&gt;
''Dan Bergh Johnsson, Omegapoint'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Automated vs. Manual Security: You Can't Filter &amp;quot;The Stupid&amp;quot;]]&amp;lt;br&amp;gt; &lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Session Fixation - the Forgotten Vulnerability?]] &lt;br /&gt;
''Michael Schrank and Bastian Braun, University of Passau&amp;lt;br&amp;gt;Martin Johns, SAP Research'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: To Be Announced&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 19:00-23:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(43, 58, 109);&amp;quot; | [[Image:OWASP_AppSec_Research_2010_Stockholm_City_Hall_exterior_small.jpg|Stockholm City Hall, photo by Yanan Li]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(43, 58, 109); color: white;&amp;quot; | '''Gala Dinner''' at [http://international.stockholm.se/Tourism-and-history/The-Famous-City-Hall/Pictures-of-the-City-Hall/ &amp;lt;span style=&amp;quot;color:rgb(163, 178, 229);&amp;quot;&amp;gt;Stockholm City Hall&amp;lt;span&amp;gt;]&amp;lt;br&amp;gt;Sponsored by&amp;lt;br&amp;gt;[[Image:OWASP AppSec Research 2010 Google logo for program.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(43, 58, 109);&amp;quot; | [[Image:OWASP_AppSec_Research_2010_Stockholm_City_Hall_Golden_Hall_small.jpg|The Golden Hall, photo by Yanan Li]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg|250px|Microsoft - Diamond Sponsor]] [[Image:AppSec Research 2010 Google 20k sponsor.jpg|150px|Google - Dinner Party and Expo Sponsor]] [[Image:Portwise logo.png|130px|PortWise - Gold and Badge Sponsor]] [[Image:Cybercom logo.png|100px|Cybercom - Gold Sponsor]] [[Image:Fortify logo AppSec Research 2010.png|120px|Fortify - Gold Sponsor]] [[Image:Omegapoint logo.png|110px|Omegapoint - Gold Sponsor]] [[Image:Mnemonic logo.png|100px|Mnemonic - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg|100px|NIXU - Silver Sponsor]] [[Image:Hps_logo.png|140px|High Performance Systems - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor F5 logo.jpg|70px|F5 - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Imperva logo.jpg|100px|Imperva - Silver Sponsor]] [[Image:AppSec_Research_2010_sponsor_Promon_logo.jpg|100px|Promon - Silver Sponsor]] [[Image:IIS logo.png|100px|Stiftelsen för Internetinfrastruktur - Lunch Sponsor]] [[Image:MyNethouse logo.png|100px|MyNethouse - Coffee Break Sponsor]] [[Image:AppSec Research 2010 Help Net Security sponsor.jpg|100px|Help Net Security - Media Sponsor]] [[Image:TrustwaveLogo.jpg|100px|Trustwave - Notepad sponsor]]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Keynote: Cross-Domain Theft and the Future of Browser Security  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec research 2010 invited talk 1.jpg]] &lt;br /&gt;
&lt;br /&gt;
'''Chris Evans'''&amp;lt;br&amp;gt; Troublemaker, Information Security Engineer, and Tech Lead at Google inc.&amp;lt;br&amp;gt; Also the sole author of vsftpd. &lt;br /&gt;
&lt;br /&gt;
'''Ian Fette'''&amp;lt;br&amp;gt; Product Manager for Chrome Security and Google's Anti-Malware initiative &lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&amp;lt;br&amp;gt; The web browser, and associated machinery, is on the front line of attacks. We will first look at design-level problems with the traditional browser in terms of monolithic architecture and fundamental problems with the same-origin policy. We will then look at the types of solution that are starting to appear in browsers such as Google Chrome and Internet Explorer. We will look at other important browser-based defenses such as Safe Browsing. We will detail what a future browser might look like that has a much more secure design, but is still usable on the wide variety of web sites that people use daily. &lt;br /&gt;
&lt;br /&gt;
== DAY 1, TRACK 1  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] BitFlip: Determine a Data's Signature Coverage from Within the Application  ===&lt;br /&gt;
&lt;br /&gt;
''Henrich Christopher Poehls, University of Passau - ISL'' &lt;br /&gt;
&lt;br /&gt;
Despite applied cryptographic primitives applications are working on data that was not protected by them. We show by abstracting the message flow between the application and the underlying wire, that protection is applied to a different data model. Taking problems from real life, like XML wrapping attacks and digital signatures on XML, we show that establishing the right linkage between the security checked on lower levels and the application above is practically difficult. We propose a application controlled check, the BitFlip-test. By this simple test an application can test if the application's assumed protection of a data value was indeed provided by the digital signature applied to the message that contained the value. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Towards Building Secure Web Mashups  ===&lt;br /&gt;
&lt;br /&gt;
''Maarten Decat, Philippe De Ryck, Lieven Desmet, Frank Piessens, and Wouter Joosen, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
Web mashups combine components from multiple sources into a single, interactive application. This kind of setup typically requires both interaction between the components to achieve the necessary functionality, as well as component separation to achieve a secure execution. Unfortunately, the traditional web is not designed to easily fulfill both requirements, which can be seen in the restrictions imposed by traditional development techniques. This paper gives an overview of these traditional techniques and investigates new developments, specifically aimed at combining components in a secure manner. In addition, topics for further improvement are identified to ensure a wide adaptation of secure mashups. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Busting Frame Busting  ===&lt;br /&gt;
&lt;br /&gt;
''Gustav Rydstedt, Stanford Web Security Research''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint work with Elie Bursztein, Dan Boneh, and Collin Jackson.&lt;br /&gt;
&lt;br /&gt;
Web framing attacks such as clickjacking use iframes to hijack a user's web session. The most common defense, called frame busting, prevents a site from functioning when loaded inside a frame. We study frame busting practices for the Alexa Top-500 sites and show that all can be circumvented in one way or another. Some circumventions are browser-specific while others work across browsers. We conclude with recommendations for proper frame busting.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] (New) Object Capabilities and Isolation of Untrusted Web Applications ===&lt;br /&gt;
&lt;br /&gt;
''Sergio Maffeis, Imperial College, London'' &lt;br /&gt;
&lt;br /&gt;
The object-capability model provides an appealing approach for isolating untrusted content in mashups: if untrusted applications are provided disjoint capabilities they still can interact with the user or the hosting page, but they cannot directly interfere with each other. We develop language-based foundations for isolation proofs based on object-capability concepts, and we show the applicability of our framework for a specific class of mashups. As an application, we prove that a JavaScript subset based on Google Caja is capability safe.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Security Toolbox for .NET Development and Testing  ===&lt;br /&gt;
&lt;br /&gt;
''Johan Lindfors and Dag König, Microsoft'' &lt;br /&gt;
&lt;br /&gt;
Being a developer on the Microsoft platform leveraging .NET doesn’t only involve keeping up with the continuous development of the underlying framework and technologies. It also means to be on top of the latest security threats and naturally the available mitigations and best practices to protect the customers and users of the applications and solutions being developed. &lt;br /&gt;
&lt;br /&gt;
In this session we will demonstrate how you as a .NET developer can leverage existing tools and technologies to build safer applications. During the demonstrations you will get more familiar with the existing tools within Visual Studio but also be introduced and educated in more tools that will help you build a toolbox for secure development and security testing. &lt;br /&gt;
&lt;br /&gt;
But one must also remember that tools will never replace knowledge and hence we will also show you how you can regularly get updated with the latest information from Microsoft on security including how to leverage SDL – Security Development Lifecycle, within your own projects. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Value Objects a la Domain-Driven Security: A Design Mindset to Avoid SQL Injection and Cross-Site Scripting  ===&lt;br /&gt;
&lt;br /&gt;
''Dan Bergh Johnsson, Omegapoint'' &lt;br /&gt;
&lt;br /&gt;
SQL Injection and Cross-Site Scripting have been topping the OWASP Top Ten for the last years. It must be a top priority for the community to evolve designs and mindsets that help the programmers to avoid these traps in their day-to-day work, where they have so much else but security that calls for their attention. The ambition of this presentation is to show design and coding practices that are well established in other fields of software development and put them to use to avoid just-mentioned traps. We also show some small refactorings that can be immediately applied to an existing codebase to make significant improvements to its security. Attendants of the session should be able to go back to work Monday morning and finish an improvement in this style before Monday lunch. &lt;br /&gt;
&lt;br /&gt;
We take inspiration from Domain Driven Design (DDD), which is characterized by its focus on what the software intend to represent. In particular, we make heavy use of the Value Object design pattern, where strict typing help us enforce that the incoming data is truthful to the restrictions of the domain. We start out with Injection Flaws and use the canonical username SQL Injection attack (“’OR 1=1 --“) as an example. Realizing that mentioned string was not intended as a valid username we elaborate the model to reflect this. Further more we make this change explicit in the code by introducing the new type and class Username. This also gives a natural place to put validation code, which otherwise often is placed in utility classes where it is easily forgotten and seldom called. In fact, we can even design service methods to require a validated Username, thus using the strong typing to enforce validation in the calling client system tier. &lt;br /&gt;
&lt;br /&gt;
Making this re-design with associated code changes is performed as a demo, and en route we discuss other design options and their relative merits and drawbacks. Again using DDD we proceed to analyse XSS. In the same way we see that XSS is in the general case not an indata validation problem. An extended analysis proposes that it can be phrased as an output-encoding problem. Using a similar technique we model the target domain of web content as the new type HTMLString, and can thereby enforce conversion from ordinary strings to strings with the proper encoding. If you have multiple content channels, then each channel will. &lt;br /&gt;
&lt;br /&gt;
All steps needed are shown in code, starting with a vulnerable application and through controlled refactoring steps ending up with a version without the vulnerability. In summary, we will take an established quality practice from another field of software development and use it to get security improvements. The main benefits are two: firstly, the method gently guides and reminds the programmers to include validation and encoding in an unobtrusive way. Secondly, the work can be performed in very small steps, where the first can be finished before lunch Monday after the conference. &lt;br /&gt;
&lt;br /&gt;
== DAY 1, TRACK 2  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] CsFire: Browser-Enforced Mitigation Against CSRF  ===&lt;br /&gt;
&lt;br /&gt;
''Lieven Desmet and Philippe De Ryck, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
Cross-Site Request Forgery (CSRF) is a web application attack vector that can be leveraged by an attacker to force an unwitting user's browser to perform actions on a third party website, possibly reusing all cached authentication credentials of that user. &lt;br /&gt;
&lt;br /&gt;
Currently, a whole range of techniques exist to mitigate CSRF, either by protecting the server application or by protecting the end-user. Unfortunately, the server-side protection mechanisms are not yet widely adopted, and the client-side solutions provide only limited protection or cannot deal with complex web 2.0 applications, which use techniques such as AJAX, mashups or single sign-on (SSO). &lt;br /&gt;
&lt;br /&gt;
In this talk, we will presents three interesting results of our research: (1) an extensive, real‐world traffic analysis to gain more insights in cross‐domain web interactions, (2) requirements for client‐side mitigation against CSRF and an analysis of existing browser extensions and (3) CsFire, our newly developed FireFox extension to mitigate CSRF. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Automated vs. Manual Security: You Can't Filter &amp;quot;The Stupid&amp;quot;  ===&lt;br /&gt;
&lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave'' &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
Automated tools certainly have some strengths (namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks). In addition to preventing some attacks, WAFs also have advantages for some compliance frameworks. However, automated solutions are far from perfect. To begin with, there are entire classes of very important vulnerabilities that are theoretically impossible for automated software to detect (at least until HAL comes online). Examples include complex information leakage, race conditions, logic flaws, design flaws, subjective vulnerabilities such as CSRF, and multistage process attacks. &lt;br /&gt;
&lt;br /&gt;
Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. Automated tools are designed to cover common application designs and platforms. Applications using an unusual layout or components will not be thoroughly protected by automated tools. Realistically, only the most vanilla of web applications written on common, simple platforms will receive solid code coverage from an automated tool. &lt;br /&gt;
&lt;br /&gt;
On the other hand, manual testing is far more versatile. An experienced penetration tester can identify complicated vulnerabilities in the same way that an attacker does. Specific, real-world examples of vulnerabilities only recognizable by humans will be provided. The diversity of vulnerabilities shown will clearly demonstrate that all applications have the potential for significant vulnerabilities not detectable by automated tools. &lt;br /&gt;
&lt;br /&gt;
Manual source code reviews present even more benefits by identifying vulnerabilities that require access to source code. Examples include “hidden” or unused application components, SQL injection with no evidence in the response, exotic injection attacks (e.g. mainframe session attacks), vulnerabilities in back-end systems, and intentional backdoors. Many organizations assume that this type of vulnerability is not a large threat, but source code can be obtained by disgruntled developers, by internal attackers when the repository isn’t properly secured, by exploiting platform bugs or path directory traversal attacks, and by external attackers using a Trojan horse or similar technique. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Web Frameworks and How They Kill Traditional Security Scanning  ===&lt;br /&gt;
&lt;br /&gt;
''Christian Hang and Lars Andren, Armorize Technologies'' &lt;br /&gt;
&lt;br /&gt;
Modern web application frameworks present a challenge to static analysis technologies due to how they influence application behavior in ways not obvious from the source code. This prevents efficient security scanning and can cause up to 80% of total potential issues to remain undetected due to the incorrect framework handling. After explaining the underlying problems, we demonstrate in a real world walk through using code analysis to scan actual application code. By extending static analysis with new framework specific components, even applications using complex frameworks like Struts and Smarty can be inspected automatically and code coverage of security analysis can be greatly enhanced. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Beyond the Same-Origin Policy  ===&lt;br /&gt;
&lt;br /&gt;
''Jasvir Nagra and Mike Samuel, Google Inc'' &lt;br /&gt;
&lt;br /&gt;
The same-origin policy has governed interaction between client-side code and user data since Netscape 2.0, but new development techniques are rendering it obsolete. Traditionally, a website consisted of server-side code written by trusted, in-house developers&amp;amp;nbsp;; and a minimum of client-side code written by the same in-house devs. The same-origin policy worked because it didn't matter whether code ran server-side or client-side&amp;amp;nbsp;; the user was interacting with code produced by the same organization. But today, complex applications are being written almost entirely in client-side code requiring developers to specialize and share code across organizational boundaries. &lt;br /&gt;
&lt;br /&gt;
This talk will explain how the same-origin policy is breaking down, give examples of attacks, discuss the properties that any alternative must have, introduce a number of alternative models being examined by the Secure EcmaScript committee and other standards bodies, demonstrate how they do or don't thwart these attacks, and discuss how secure interactive documents could open up new markets for web developers. We assume a basic familiarity with web application protocols&amp;amp;nbsp;: HTTP, HTML, JavaScript, CSS&amp;amp;nbsp;; and common classes of attacks&amp;amp;nbsp;: XSS, XSRF, Phishing. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Cross-Site Location Jacking (XSLJ) (not really)  ===&lt;br /&gt;
&lt;br /&gt;
''David Lindsay, Cigital Inc, and Eduardo Vela Nava sla.ckers.org'' &lt;br /&gt;
&lt;br /&gt;
Redirects are commonly used on many websites and are an integral part of many web frameworks. However, subtle and not so subtle issues can lead to security holes and privacy issues. In this presentation, we will discuss several high and low level issues related to redirects and demonstrate how the issues can be exploited. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] New Insights into Clickjacking  ===&lt;br /&gt;
&lt;br /&gt;
''Marco Balduzzi, Eurecom'' &lt;br /&gt;
&lt;br /&gt;
Over the past year, clickjacking received extensive media coverage. News portals and security forums have been overloaded by posts claiming clickjacking to be the upcoming security threat. In a clickjacking attack, a malicious page is constructed (or a benign page is hijacked) to trick the user into performing unintended clicks that are advantageous for the attacker, such as propagating a web worm, stealing confidential information or abusing of the user session. In this talk, we formally define the problem and introduce our novel solution for automated detection of clickjacking attacks. We present the details of the system architecture and its implementation, and we evaluate the results we obtained from the analysis of over a million unique Internet pages. We conclude by discussing the clickjacking phenomenon and its future implications. &lt;br /&gt;
&lt;br /&gt;
== DAY 1, TRACK 3  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Deconstructing ColdFusion  ===&lt;br /&gt;
&lt;br /&gt;
''Chris Eng, Veracode'' &lt;br /&gt;
&lt;br /&gt;
This presentation is a technical survey of ColdFusion security, which will be of interest mostly to code auditors and penetration testers. We’ll cover the basics of ColdFusion markup, control flow, functions, and components and demonstrate how to identify common web application vulnerabilities at the source code level. We’ll also delve into ColdFusion J2EE internals, describing some of the unexpected properties we’ve observed while decompiling ColdFusion applications for static analysis. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] How to Render SSL Useless  ===&lt;br /&gt;
&lt;br /&gt;
''Ivan Ristic, Feisty Duck'' &lt;br /&gt;
&lt;br /&gt;
SSL is the technology that secures the Internet, but it is effective only when deployed properly. While the SSL protocol itself is very robust and easy to use, the same cannot be said for the usability of the complete ecosystem, which includes server configuration, certificates and application implementation details. In fact, SSL deployment is generally plagued with traps at every step of the way. As a result, too many web sites use insecure deployment practices that render SSL completely useless. In this talk I will present a list of top ten (or thereabout) deployment mistakes, based on my work on the SSL Labs assessment platform (https://www.ssllabs.com). &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] The State of SSL in the World  ===&lt;br /&gt;
&lt;br /&gt;
''Michael Boman, Omegapoint'' &lt;br /&gt;
&lt;br /&gt;
What is the status of SSL deployments in Fortune 500 companies and the top 10'000 websites (according to Alexa)? While developing a tool that was needed to perform the test-case OWASP-CM-001 (Testing for SSL-TLS) it was noticed that some sites had very good SSL-configuration, sometimes unexpectedly, and some sites has very poor security configuration, even when you could expect the site to have good security standard. Does the organization behind the site has any bearing on how good the security standard the site has in regards to HTTPS-support and configuration? The talk will highlight the findings and the tools and process of obtaining the underlying data, while also trying to answer the questions: - How many of the Fortune 500 and Top 10'000 websites offer an HTTPS-enabled browser experience to their visitors? - How is the HTTPS-server configured in regards to SSL-protocols offered, key exchange and key lengths (bit-size)? - Are there any correlation between company size, industry or popularity and the HTTPS-enabled browsing experience and the HTTPS-configuration? &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] SmashFileFuzzer - a New File Fuzzer Tool  ===&lt;br /&gt;
&lt;br /&gt;
''Komal Randive, Symantec'' &lt;br /&gt;
&lt;br /&gt;
Here is a tool SmashFileFuzzer designed and developed to address the same problem with ease. SmashFileFuzzer understands the file formats and then user can specify the fields in the file to be fuzzed. SmashFileFuzzer acts on a sample file of the required format and generates multiple fuzzed file copies from this sample file. SmashFileFuzzer also has the support to add more custom file formats to be able to fuzz them, especially .dat formats. In comparison with the existing file fuzzers and frameworks this fuzzer has simple language for adding new formats, many more modes of fuzzing and attack oriented fuzzing. Following are the highlights of this fuzzer &lt;br /&gt;
&lt;br /&gt;
*Support to understand the file formats and fuzz specific fields with specified/random data &lt;br /&gt;
*Understands the correlation between different fields and manipulates them in accordance with the fuzzed content. &lt;br /&gt;
*Can generate valid fuzzed files even based on the partial format understanding. Only the portions of file format which are understood by the user can be used to generate valid fuzzed files. &lt;br /&gt;
*Understands the custom formats for file types and also for the configuration files(e.g key value pair format or .dat formats) &lt;br /&gt;
*Tool is designed to be easily extended for any new file formats &lt;br /&gt;
*Fuzz strings are read from a dictionary file. Users can add application specific input string to this dictionary for testing. &lt;br /&gt;
*It’s a unix shell based tool which can be easily scripted.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Owning Oracle: Sessions and Credentials  ===&lt;br /&gt;
&lt;br /&gt;
''Wendel G. Henrique and Steve Ocepek, Trustwave'' &lt;br /&gt;
&lt;br /&gt;
In a world of free, ever-present encryption libraries, many penetration testers still find a lot of great stuff on the wire. Database traffic is a common favorite, and with good reason: when the data includes PAN, Track, and CVV, it makes you stop and wonder why this stuff isn’t encrypted across the board. However, despite this weakness, we still need someone to issue queries before we see the data. Or maybe not… after all, it’s just plaintext. &lt;br /&gt;
&lt;br /&gt;
Wendel G. Henrique and Steve Ocepek of Trustwave’s SpiderLabs division offer a closer look at the world’s most popular relational database: Oracle. Through a combination of downgrade attacks and session take-over exploits, this talk introduces a unique approach to database account hijacking. Using a new tool, thicknet, the team will demonstrate how deadly injection and downgrade attacks can be to database security. &lt;br /&gt;
&lt;br /&gt;
The Oracle TNS/Net8 protocol was studied extensively during presentation for this talk. Very little public knowledge of this protocol exists today, and much of the data gained is, as far as we know, new to Oracle outsiders. &lt;br /&gt;
&lt;br /&gt;
Also, during the presentation we will be offering to attendants: &lt;br /&gt;
&lt;br /&gt;
*Knowledge about man-in-the-middle and downgrade attacks, especially the area of data injection. &lt;br /&gt;
*A better understanding of the network protocol used by Oracle. &lt;br /&gt;
*The ability to audit databases against this type of attack vector. &lt;br /&gt;
*Ideas for how to prevent this type of attack, and an understanding of the value of encryption and digital signature technologies. &lt;br /&gt;
*Understanding of methodologies used to reverse-engineer undocumented protocols.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Session Fixation - the Forgotten Vulnerability?  ===&lt;br /&gt;
&lt;br /&gt;
''Michael Schrank and Bastian Braun, University of Passau, and Martin Johns, SAP Research'' &lt;br /&gt;
&lt;br /&gt;
The term 'Session Fixation vulnerability' subsumes issues in Web applications that under certain circumstances enable the adversary to perform a session hijacking attack through ontrolling the victim's session identier value. We explore this vulnerability pattern. First, we give an analysis of the root causes and document existing attack vectors. Then we take steps to assess the current attack surface of Session Fixation. Finally, we present a transparent server-side method for mitigating vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== June 24  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''Conference Day 2 - June 24, 2010''' &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] = Research paper [[Image:OWASP AppSec Research 2010 Demo D.gif]] = Demo [[Image:OWASP AppSec Research 2010 Presentation P.gif]] = Presentation &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-08:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-10:00 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:rgb(252, 252, 150)&amp;quot; align=&amp;quot;center&amp;quot; | [[#Keynote: The Security Development Lifecycle - The Creation and Evolution of a Security Development Process]]&amp;lt;br&amp;gt;''Steve Lipner, Senior Director of Security Engineering Strategy, Microsoft Corporation''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:10-10:45 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#The Anatomy of Real-World Software Security Programs]] &lt;br /&gt;
&lt;br /&gt;
''Pravir Chandra, Fortify'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Promon TestSuite: Client-Based Penetration Testing Tool]] &lt;br /&gt;
&lt;br /&gt;
''Folker den Braber and Tom Lysemose Hansen, Promon'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#A Taint Mode for Python via a Library]] &lt;br /&gt;
&lt;br /&gt;
''Juan José Conti, Universidad Tecnológica Nacional&amp;lt;br&amp;gt;Alejandro Russo, Chalmers Univ. of Technology'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:45-11:10 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:90%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF, Coffee sponsor: [[Image:OWASP AppSec Research 2010 MyNethouse logo for program.png]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:10-11:45 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Microsoft's Security Development Lifecycle for Agile Development]] &lt;br /&gt;
&lt;br /&gt;
''Nick Coblentz, OWASP Kansas City Chapter and AT&amp;amp;T Consulting'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Detecting and Protecting Your Users from 100% of all Malware - How?]] &lt;br /&gt;
&lt;br /&gt;
''Bradley Anstis and Vadim Pogulievsky, M86 Security'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#OPA: Language Support for a Sane, Safe and Secure Web]] &lt;br /&gt;
&lt;br /&gt;
''David Rajchenbach-Teller and François-Régis Sinot, MLstate'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:55-12:30 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Secure Application Development for the Enterprise: Practical, Real-World Tips]] &lt;br /&gt;
&lt;br /&gt;
''Michael Craigue, Dell'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Responsibility for the Harm and Risk of Software Security Flaws]] &lt;br /&gt;
&lt;br /&gt;
''Cassio Goldschmidt, Symantec'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Secure the Clones: Static Enforcement of Policies for Secure Object Copying]] &lt;br /&gt;
&lt;br /&gt;
''Thomas Jensen and David Pichardie, INRIA Rennes - Bretagne Atlantique'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF, '''Lunch break sponsoring position open''' ($4,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:20 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Product Security Management in Agile Product Management]] &lt;br /&gt;
&lt;br /&gt;
''Antti Vähä-Sipilä, Nokia'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Hacking by Numbers]] &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan, WhiteHat Security and OWASP Foundation&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Safe Wrappers and Sane Policies for Self Protecting JavaScript]] &lt;br /&gt;
&lt;br /&gt;
''Jonas Magazinius, Phu H. Phung, and David Sands, Chalmers Univ. of Technology'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:05 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#OWASP_Top_10_2010]] &lt;br /&gt;
&lt;br /&gt;
''Dave Wichers, Aspect Security and OWASP Foundation&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Application Security Scoreboard in the Sky]] &lt;br /&gt;
&lt;br /&gt;
''Chris Eng, Veracode'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#On the Privacy of File Sharing Services]] &lt;br /&gt;
&lt;br /&gt;
''N Nikiforakis, F Gadaleta, Y Younan, and W Joosen, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:05-15:30 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF, '''Coffee break sponsoring position open''' ($2,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:00 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:90%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | CTF Price Ceremony, Announcement of OWASP AppSec EU 2011, Closing Notes&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg|250px|Microsoft - Diamond Sponsor]] [[Image:AppSec Research 2010 Google 20k sponsor.jpg|150px|Google - Dinner Party and Expo Sponsor]] [[Image:Portwise logo.png|130px|PortWise - Gold and Badge Sponsor]] [[Image:Cybercom logo.png|100px|Cybercom - Gold Sponsor]] [[Image:Fortify logo AppSec Research 2010.png|120px|Fortify - Gold Sponsor]] [[Image:Omegapoint logo.png|110px|Omegapoint - Gold Sponsor]] [[Image:Mnemonic logo.png|100px|Mnemonic - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg|100px|NIXU - Silver Sponsor]] [[Image:Hps_logo.png|140px|High Performance Systems - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor F5 logo.jpg|70px|F5 - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Imperva logo.jpg|100px|Imperva - Silver Sponsor]] [[Image:AppSec_Research_2010_sponsor_Promon_logo.jpg|100px|Promon - Silver Sponsor]] [[Image:IIS logo.png|100px|Stiftelsen för Internetinfrastruktur - Lunch Sponsor]] [[Image:MyNethouse logo.png|100px|MyNethouse - Coffee Break Sponsor]] [[Image:AppSec Research 2010 Help Net Security sponsor.jpg|100px|Help Net Security - Media Sponsor]] [[Image:TrustwaveLogo.jpg|100px|Trustwave - Notepad sponsor]]&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
== Keynote: The Security Development Lifecycle - The Creation and Evolution of a Security Development Process  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec research 2010 invited talk 2.jpg]] &lt;br /&gt;
&lt;br /&gt;
'''Steve Lipner'''&amp;lt;br&amp;gt; Senior Director of Security Engineering Strategy, Trustworthy Computing Security, Microsoft Corporation.&amp;lt;br&amp;gt; Co-author of &amp;quot;The Security Development Lifecycle&amp;quot;, Microsoft Press (book cover above). &lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&amp;lt;br&amp;gt; This keynote will review the evolution of the Security Development Lifecycle (SDL) from its origins in the Microsoft “security pushes” of 2002-3 through its current status and application in 2010. It will emphasize the aspects of change and change management as the SDL and its user community have matured and grown and will conclude with a summary of some recent changes and additions to the SDL. Specific topics to be addressed include: &lt;br /&gt;
&lt;br /&gt;
*Motivations for introducing both the SDL and its predecessor processes. &lt;br /&gt;
*Considerations in selling the process to management and sustaining a mandate over a prolonged period. &lt;br /&gt;
*Scaling the SDL to an organization with tens of thousands of engineers. &lt;br /&gt;
*Managing change. &lt;br /&gt;
*The role of automation in the SDL. &lt;br /&gt;
*Adaptation of the SDL to agile development processes. &lt;br /&gt;
*Thoughts for organizations that are considering implementing the SDL.&lt;br /&gt;
&lt;br /&gt;
The presentation will cover technical aspects of the SDL including a brief review of requirements and tools, and results. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio'''&amp;lt;br&amp;gt; Steven B. Lipner is senior director of Security Engineering Strategy at Microsoft Corp where he is responsible for programs that provide improved product security for Microsoft customers. Lipner leads Microsoft’s Security Development Lifecycle (SDL) team and is responsible for the definition of Microsoft’s SDL and for programs to make the SDL available to organizations beyond Microsoft. Lipner is also responsible for Microsoft’s corporate strategies related to government security evaluation of Microsoft products. &lt;br /&gt;
&lt;br /&gt;
Lipner is coauthor with Michael Howard of The Security Development Lifecycle (Microsoft Press, 2006) and is named as inventor on twelve U.S. patents and two pending applications in the field of computer and network security. He has authored numerous professional papers and conference presentations, and served on several National Research Council committees. He served two terms – a total of more than ten years – on the United States Information Security and Privacy Advisory Board and its predecessor. Lipner holds S.B. and S.M. degrees in Civil Engineering from the Massachusetts Institute of Technology and attended the Harvard Business School’s Program for Management Development. &lt;br /&gt;
&lt;br /&gt;
== DAY 2, TRACK 1  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] The Anatomy of Real-World Software Security Programs  ===&lt;br /&gt;
&lt;br /&gt;
''Pravir Chandra, Fortify'' &lt;br /&gt;
&lt;br /&gt;
Effectively reducing risk from software vulnerabilities remains a challenge for most organizations despite the existence of several secure SDLC models. From conducting technical assessments to earning management buy-in, there may not seem to be a lot of easy answers along the way, but experiences from the field shows that there is indeed hope. We've learned that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; simply require the answers to be customized to each organization. Whether you’re a developer or a CISO, this talk will leave you with actionable advice that you can use to help take your software security assurance program to the next level.&lt;br /&gt;
 &lt;br /&gt;
To help organizations formulate their own solutions, we'll discuss several real-world examples of programs in action. From there, we’ll talk about lessons learned and introduce the ''Open Software Assurance Maturity Model'' (OpenSAMM), a flexible framework for building a balanced software security assurance program (OpenSAMM is an open and free OWASP project and more information is available at http://www.opensamm.org). Using the framework, attendees will learn how to self-assess their security activities and use available resources to drive improvement in small and measurable iterations. With time remaining, we’ll also discuss the latest work on the OpenSAMM project and how it relates to other modern approaches to building out assurance programs.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Microsoft's Security Development Lifecycle for Agile Development  ===&lt;br /&gt;
&lt;br /&gt;
''Nick Coblentz, OWASP Kansas City Chapter and AT&amp;amp;amp;T Consulting'' &lt;br /&gt;
&lt;br /&gt;
Many development and security teams believe Agile development cannot be accomplished securely.  During this presentation, Nick Coblentz will discuss the recent guidance from Microsoft that enables development teams to include secure development activities within their Agile processes without compromising features or functionality. Nick will also demonstrate ASP.NET libraries, strategies, and automated tools to reduce the effort required by developers.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Secure Application Development for the Enterprise: Practical, Real-World Tips  ===&lt;br /&gt;
&lt;br /&gt;
''Michael Craigue, Dell'' &lt;br /&gt;
&lt;br /&gt;
Dell has a reputation for IT simplification and a lean cost structure. We take the same approach with our application security program. This talk covers money-saving tips in the creation and evolution of Dell's Security Development Lifecycle, including risk assessments, security reviews, threat modeling, source code scans, awareness/training, application security user groups, security consulting staff development, and assurance scans/penetration testing. We’ll discuss how we have adapted our program to our IT, Product Group, and Services organizations. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Product Security Management in Agile Product Management  ===&lt;br /&gt;
&lt;br /&gt;
''Antti Vähä-Sipilä, Nokia'' &lt;br /&gt;
&lt;br /&gt;
This paper provides a model for product security risk management and security requirements elicitation in an agile product management framework, using the concepts of Scrum and an epics-based agile requirements model. The paper documents some real-life experiences of rolling out such a risk management model. The model addresses security threat analysis and risk acceptance, and is agnostic to the actual security engineering practices employed in the Scrum teams, and is scalable over large and small enterprises. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] OWASP Top 10 2010  ===&lt;br /&gt;
&lt;br /&gt;
''Dave Wichers, Aspect Security and OWASP Foundation'' &lt;br /&gt;
&lt;br /&gt;
This presentation will cover the OWASP Top 10 - 2010 (final version). The OWASP Top 10 was originally released in 2003 to raise awareness of the importance of application security. As the field evolves, the Top 10 needs to be periodically updated to keep with up with the times. The Top 10 was updated in 2004 and the last update was in 2007, where it introduced Cross Site Request Forgery (CSRF) as the big new emerging web application security risk. &lt;br /&gt;
&lt;br /&gt;
This update will be based on more sources of web application vulnerability information than the previous versions were when determining the new Top 10. It will also present this information in a more concise, compelling, and consumable manner, and include strong references to the many new openly available resources that can help address each issue, particularly OWASP's new Enterprise Security API (ESAPI) and Application Security Verification Standard (ASVS) projects. &lt;br /&gt;
&lt;br /&gt;
A significant change for this update will be that the OWASP Top 10 will be focused on the Top 10 Risks to Web Applications, not just the most common vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
== DAY 2, TRACK 2  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Promon TestSuite: Client-Based Penetration Testing Tool  ===&lt;br /&gt;
&lt;br /&gt;
''Folker den Braber and Tom Lysemose Hansen, Promon'' &lt;br /&gt;
&lt;br /&gt;
Vulnerability analysis has a wide scope containing both social and technical aspects. An important part of technical vulnerability analysis consists of penetration testing. In most cases, penetration testing is focused on either server side or network layer vulnerabilities. In this demonstration we will have a closer look at vulnerability analysis on the client side, while demonstrating the use of the Promon Testuite testing tool. &lt;br /&gt;
&lt;br /&gt;
Promon TestSuite is designed to use the same vectors as common malware but in a clear and visual way, with varying payloads to illustrate the security issues involved with giving injected code free access to a programs memory. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Detecting and Protecting Your Users from 100% of all Malware - How?  ===&lt;br /&gt;
&lt;br /&gt;
''Bradley Anstis and Vadim Pogulievsky, M86 Security'' &lt;br /&gt;
&lt;br /&gt;
100% Malware detection is the goal but is it really achievable?  This session looks at the traditional Malware detection technologies and how well they perform today and then compares this to some newer approaches with demonstrations of Real-time code analysis and Behavioral Analysis technologies to see what is better or worse.&lt;br /&gt;
&lt;br /&gt;
100% detection rates are the goal, but how close can we get with a single technology, or what combination of technologies can we use to get as close as possible?&lt;br /&gt;
&lt;br /&gt;
This session is all about challenging the existing accepted practices for Malware protection. We want to open the minds of the attendees, encourage them to question existing solutions and the incumbent market leading vendors. We want you to also re-evaluate their environment to see if improvements can be made.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Responsibility for the Harm and Risk of Software Security Flaws  ===&lt;br /&gt;
&lt;br /&gt;
''Cassio Goldschmidt, Symantec Corp'' &lt;br /&gt;
&lt;br /&gt;
Who is responsible for the harm and risk of security flaws? The advent of worldwide networks such as the internet made software security (or the lack of software security) become a problem of international proportions. There are no mathematical/statistical risk models available today to assess networked systems with interdependent failures. Without this tool, decision-makers are bound to overinvest in activities that don’t generate the desired return on investment or under invest on mitigations, risking dreadful consequences. Experience suggests that no party is solely responsible for the harm and risk of software security flaws but a model of partial responsibility can only emerge once the duties and motivations of all parties are examine and understood. &lt;br /&gt;
&lt;br /&gt;
State of the art practices in software development won’t guarantee products free of flaws. The infinite principles of mathematics are not properly implemented in modern computer hardware without having to truncate numbers and calculations. Many of the most common operating systems, network protocols and programming languages used today were first conceived without the basic principles of security in mind. Compromises are made to maintain compatibility of newer versions of these systems with previous versions. Evolving software inherits all flaws and risks that are present in this layered and interdependent solution. Lastly, there are no formal ways to prove software correctness using neither mathematics nor definitive authority to assert the absence of vulnerabilities. The slightest coding error can lead to a fatal flaw. Without a doubt, vulnerabilities in software applications will continue to be part of our daily lives for years to come. &lt;br /&gt;
&lt;br /&gt;
Decisions made by adopters such as whether to install a patch, upgrade a system or employed insecure configurations create externalities that have implications on the security of other systems. Proper cyber hygiene and education are vital to stop the proliferation of computer worms, viruses and botnets. Furthermore, end users, corporations and large governments directly influence software vendors’ decisions to invest on security by voting with their money every time software is purchased or pirated. &lt;br /&gt;
&lt;br /&gt;
Security researchers largely influence the overall state of software security depending on the approach taken to disclose findings. While many believe full disclosure practices helped the software industry to advance security in the past, several of the most devastating computer worms were created by borrowing from information detailed by researcher’s full disclosure. Both incentives and penalties were created for security researchers: a number of stories of vendors suing security researchers are available in the press. Some countries enacted laws banning the use and development of “hacking tools”. At the same time, companies such as iDefense promoted the creation of a market for security vulnerabilities providing rewards that are larger than a year’s worth of salary for a software practitioner in countries such as China and India. &lt;br /&gt;
&lt;br /&gt;
Effective policy and standards can serve as leverage to fix the problem either by providing incentives or penalties. Attempts such PCI created a perverse incentive that diverted decision makers’ goals to compliance instead of security. Stiff mandates and ineffective laws have been observed internationally. Given the fast pace of the industry, laws to combat software vulnerabilities may become obsolete before they are enacted. Alternatively, the government can use its own buying power to encourage adoption of good security standards. One example of this is the Federal Desktop Core Configuration (FDCC). &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Hacking by Numbers  ===&lt;br /&gt;
&lt;br /&gt;
''Tom Brennan, WhiteHat Security and OWASP Foundation'' &lt;br /&gt;
&lt;br /&gt;
There is a difference between what is possible and what is probable, something we often lose sight of in the world of information security. For example, a vulnerability represents a possible way for an attacker to exploit an asset, but remember not all vulnerabilities are created equal. Obviously we must also keep in mind that just because a vulnerability exists does not necessarily mean it will be exploited, or indicate by whom or to what extent. Clearly, many vulnerabilities are very serious leaving the door open to compromise of sensitive information, financial loss, brand damage, violation of industry regulations, and downtime. Some vulnerabilities are more difficult to exploit than others and therefore attract different attackers. Autonomous worms &amp;amp;amp; viruses may attack one type of issue, while a sentient targeted attacker may prefer another path. Better understanding of these factors enables us to make informed business decisions about website risk management and what is probable. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Application Security Scoreboard in the Sky  ===&lt;br /&gt;
&lt;br /&gt;
''Chris Eng, Veracode'' &lt;br /&gt;
&lt;br /&gt;
This presentation will discuss vulnerability metrics gathered from real-world applications. The statistics are derived from continuously updated data collected by Veracode’s cloud-based code analysis service. The anonymized data represents a total of nearly 1,600 applications submitted for analysis by large and small companies, commercial software providers, open source projects, and software outsourcers between February 2007 and January 2010. This is the first vulnerability analytics study of this magnitude that incorporates data from both static analysis and dynamic analysis. &lt;br /&gt;
&lt;br /&gt;
We will compare the relative security of applications by industry and origin, and we will examine detailed vulnerability distribution data in the context of taxonomies such as the OWASP Top Ten and the CWE/SANS Top 25 Programming Errors. &lt;br /&gt;
&lt;br /&gt;
== DAY 2, TRACK 3  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] A Taint Mode for Python via a Library  ===&lt;br /&gt;
&lt;br /&gt;
''Juan José Conti, Universidad Tecnológica Nacional, and Alejandro Russo, Chalmers University of Technology'' &lt;br /&gt;
&lt;br /&gt;
Vulnerabilities in web applications present threats to on-line systems. SQL injection and cross-site scripting attacks are among the most common threats found nowadays. These attacks are often result of improper or none input validation. To help discover such vulnerabilities, taint analyses have been developed in popular web scripting languages like Perl, Ruby, PHP, and Python. Such analysis are often implemented as an execution monitor, where the interpreter needs to be adapted to provide a taint mode. However, modifying interpreters might be a major task in its own right. In fact, it is very probably that new releases of interpreters require to be adapted to provide a taint mode. Differently from previous approaches, we show how to provide a taint analysis for Python via a library written entirely in Python, and thus avoiding modifications in the interpreter. The concepts of classes, decorators and dynamic dispatch makes our solution lightweight, easy to use, and particularly neat. With minimal or none effort, the library can be adapted to work with different Python interpreters. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] OPA: Language Support for a Sane, Safe and Secure Web  ===&lt;br /&gt;
&lt;br /&gt;
''David Rajchenbach-Teller and François-Régis Sinot, MLstate'' &lt;br /&gt;
&lt;br /&gt;
Web applications and services have critical needs in terms of safety, security and privacy: they need to remain available constantly and can at any time be the object of attacks by malicious and anonymous distant users attempting to take control, alter data or steal it, or cause unwanted behaviors. Unfortunately, recent history shows numerous cases of popular web applications falling victim to such attacks, despite careful attempts to secure them. &lt;br /&gt;
&lt;br /&gt;
In this paper, we introduce OPA (One Pot Application), a new platform designed to make web development sane, safe and secure. OPA provides an integrated methodology where the complete application is written with one simple language with consistent semantics, enforces safe use of the infrastructure through compile-time static checking and a novel programming paradigm suited to the web and encourages correct-by-construction development. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Secure the Clones: Static Enforcement of Policies for Secure Object Copying  ===&lt;br /&gt;
&lt;br /&gt;
''Thomas Jensen and David Pichardie, INRIA Rennes - Bretagne Atlantique'' &lt;br /&gt;
&lt;br /&gt;
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by both a code and an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to an internal mutable object. However, implementation of a copy method (like clone()) is entirely left to the programmer. It may not provide a sufficiently deep copy of an object and is subject to overriding by a malicious sub-class. Currently no language-based mechanism supports secure object cloning. &lt;br /&gt;
&lt;br /&gt;
This paper proposes a type-based annotation system for defining modular cloning policies for class-based object-oriented programs. It provides a static enforcement mechanism that will guarantee that all classes fulfill their copying policy, even in the presence of overriding of copy methods, and establishes the semantic correctness of the overall approach. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Safe Wrappers and Sane Policies for Self Protecting JavaScript  ===&lt;br /&gt;
&lt;br /&gt;
''Jonas Magazinius, Phu H. Phung, and David Sands, Chalmers Univ. of Technology'' &lt;br /&gt;
&lt;br /&gt;
Phung et al (ASIACCS’09) describe a method for wrapping built-in methods of JavaScript programs in order to enforce security policies. The method is appealing because it requires neither deep transformation of the code nor browser modification. Unfortunately the implementation outlined suffers from a range of vulnerabilities, and policy construction is restrictive and error prone. In this paper we address these issues to provide a systematic way to avoid the identified vulnerabilities, and make it easier for the policy writer to construct declarative policies – i.e. policies upon which attacker code has no side effects. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] On the Privacy of File Sharing Services  ===&lt;br /&gt;
&lt;br /&gt;
''Nick Nikiforakis, Francesco Gadaleta, Yves Younan, and Wouter Joosen, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
File sharing services are used daily by tens of thousands of people as a way of sharing files. Almost all such services, use a security-through-obscurity method of hiding the files of one user from others. For each uploaded file, the user is given a secret URL which supposedly cannot be guessed. The user can then share his uploaded file by sharing this URL with other users of his choice. Unfortunately though, a number of file sharing services are incorrectly implemented allowing an attacker to guess valid URLs of millions of files and thus allowing him to enumerate their file database and access all of the uploaded files. In this paper, we study some of these services and we record their incorrect implementations. We design automatic enumerators for two such services and a privacy-classifying module which characterises an uploaded file as private or public. Using this technique we gain access to thousands of private files ranging from private and company documents to personal photographs. We present a taxonomy of the private files found and ways that the users and services can protect themselves against such attacks. &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration is open  ==&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/i.aspx?4W%2cM3%2c717e8a7c-4453-47ff-addb-721306529534 Click Here To Register]''' &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accommodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
== Stay Informed ... and Tell Others  ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_eu_2010 Subscribe to the conference '''mailing list''']. This is the official information channel and you'll be sure to get any updates and practical info before the conference. &lt;br /&gt;
&lt;br /&gt;
[http://events.linkedin.com/OWASP-AppSec-Research-2010/pub/185990 Add the event to your '''LinkedIn''' profle] to tell all your business contacts that AppSec Research 2010 is the place to be. &lt;br /&gt;
&lt;br /&gt;
Then get on the '''Twitter''' stream by using the tags '''#OWASP''' and '''#AppSecEU'''.&lt;br /&gt;
&lt;br /&gt;
== Conference Fees (June 23-24)  ==&lt;br /&gt;
&lt;br /&gt;
*Regular registration: €350 &lt;br /&gt;
*OWASP individual member (not just chapter member): €300 &lt;br /&gt;
*Full-time students*: €225&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; We need some kind of proof of your full-time student status. Either ask your local OWASP chapter leader to vouch for you by email to Kate.Hartmann@owasp.org, or email Kate a scanned image of your student ID (please compress the file size&amp;amp;nbsp;:). &lt;br /&gt;
&lt;br /&gt;
== Training Fee (June 21-22)  ==&lt;br /&gt;
&lt;br /&gt;
*Training fee is €990 for two days, see Training tab above&lt;br /&gt;
&lt;br /&gt;
==== Practical Info  ====&lt;br /&gt;
&lt;br /&gt;
== Tailor-Made Visitors' Guide ==&lt;br /&gt;
&lt;br /&gt;
We have tailor-made a 15-page visitors' guide to the conference and Stockholm. With this guide you'll know how to get to and from the airport, find your way to the hotel and conference, know where good bars are, know when and how to tip etc. Check it out! [http://www.owasp.org/images/e/eb/OWASP_AppSec_Research_2010_Visitors_Guide_A4.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
== Swedish Wall Plugs ==&lt;br /&gt;
&lt;br /&gt;
This is how Swedish wall plugs look like (image below). The left one is not grounded and the right one is, having small metal connectors on the sides. Be sure to bring adapters, for instance like [http://international-electrical-supplies.com/sweden-plug-adapters.html these], if your's look different.&lt;br /&gt;
&lt;br /&gt;
[[Image:Swedish_wall_plugs.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Weather Forecast ==&lt;br /&gt;
&lt;br /&gt;
YR.no has good coverage of the weather in Stockholm. Checkit out [http://www.yr.no/place/Sweden/Stockholm/Stockholm/ here].&lt;br /&gt;
&lt;br /&gt;
== Travel  ==&lt;br /&gt;
&lt;br /&gt;
Stockholm's foremost international airport is Arlanda (ARN). Clean and convenient speed trains will take you between Arlanda and Stockholm Central in 20 minutes. You can also fly to Stockholm Skavsta (NYO) or Stockholm Västerås (VST) where coaches take you to Stockholm Central in 1 h 20 min. &lt;br /&gt;
&lt;br /&gt;
== Accommodation  ==&lt;br /&gt;
&lt;br /&gt;
You can choose hotel/hostel freely in Stockholm but we provided three suggestions with pre-booked rooms so many OWASPers are staying there. '''Check with sites like [http://www.hotels.com hotels.com] since they might have better prices than the hotels state themselves!''' &lt;br /&gt;
&lt;br /&gt;
[[Image:Stockholm map with hotels and public transportation.jpg]] &lt;br /&gt;
&lt;br /&gt;
Subways and buses are convenient and safe and will take you right up to the venue (station/stop &amp;quot;Universitetet&amp;quot;) from these three hotels: &lt;br /&gt;
&lt;br /&gt;
'''Best Western Time Hotel'''&amp;lt;br&amp;gt; Why? Closest to the university, direct bus or subway to the conference&amp;lt;br&amp;gt; [http://www.timehotel.se/index.aspx?languageID=5 Best Western Time Hotel]&amp;lt;br&amp;gt; Single room: 1395 SEK/€145/$195&amp;lt;br&amp;gt; Double room: 1575 SEK/€160/$220&amp;lt;br&amp;gt; (Rooms were pre-booked until May 18 under code &amp;quot;G#73641 OWASP&amp;quot;)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Scandic Continental'''&amp;lt;br&amp;gt; Why? Right at the Central Station, convenient travel to and from airport, direct subway to the conference&amp;lt;br&amp;gt; [http://www.scandichotels.com/en/Hotels/Countries/Sweden/Stockholm/Hotels/Scandic-Continental-Stockholm/ Scandic Continental]&amp;lt;br&amp;gt; Single room: 1590 SEK/€165/$220&amp;lt;br&amp;gt; Double room: 1690 SEK/€175/$235&amp;lt;br&amp;gt; (Rooms were pre-booked until early May under code &amp;quot;OWASP&amp;quot;)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Fridhemsplan's Hostel'''&amp;lt;br&amp;gt; Why? Affordable stay in Stockholm's nicest hostel, direct bus to the conference&amp;lt;br&amp;gt; [http://fridhemsplan.se/?p=Main&amp;amp;c= Fridhemsplan's Hostel]&amp;lt;br&amp;gt; Rooms cost €35-€55 ($50-$80)&amp;lt;br&amp;gt; Book directly with them through their webpage. &lt;br /&gt;
&lt;br /&gt;
==== Social Events ====&lt;br /&gt;
&lt;br /&gt;
== Official Meet Up at &amp;quot;Mosebacke&amp;quot;, Tuesday, June 22  ==&lt;br /&gt;
Regardless whether you're one of the lucky ones who will attend training or you'll just attend the conference you are invited to join us at &amp;quot;Mosebacke&amp;quot; on the evening the 22nd. Mosebacke is one of Stockholm's older establishments and is beautifully situated in the south of Stockholm city (only 2 subway stations from Central Station). The official meet up time is 20:00 CEST. We plan on beverage only, but for those who don't mind spending a little extra money on food, you can reserve a table for early evening by calling +46 8 556 098 90 during 2 pm - 5 pm (work days) or with some luck by e-mailing to mosebacke@mosebacke.se.&lt;br /&gt;
&lt;br /&gt;
How will you recognize all the other OWASPers? Some of us will have OWASP-branded grey caps, some you met earlier, some you recognize from pictures, and if you hear any non-Swedish speaking male I guess chances are they're just like you - here for the AppSec conference :).&lt;br /&gt;
&lt;br /&gt;
'''What''': Informal gathering, beer etc.&amp;lt;br&amp;gt;&lt;br /&gt;
'''When''': 8 pm CEST&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where''': Mosebacke, Mosebacke Torg 3 [http://maps.google.se/maps?f=q&amp;amp;source=s_q&amp;amp;hl=sv&amp;amp;geocode=&amp;amp;q=Mosebacke+Etablissement,+Stockholm&amp;amp;sll=59.320492,18.074398&amp;amp;sspn=0.024831,0.077162&amp;amp;gl=se&amp;amp;ie=UTF8&amp;amp;hq=Mosebacke&amp;amp;hnear=Mosebacke,+Mosebacke+Torg+3,+116+46+Stockholm&amp;amp;ll=59.320492,18.074398&amp;amp;spn=0.024831,0.077162&amp;amp;t=h&amp;amp;z=14&amp;amp;iwloc=A Google Maps]&amp;lt;br&amp;gt;&lt;br /&gt;
'''How to get there''': Subway to &amp;quot;Slussen&amp;quot; (2 stops from &amp;quot;T-centralen&amp;quot;), best exit towards &amp;quot;Götgatan&amp;quot;. Walk upwards but take the first left to &amp;quot;Hökens gata&amp;quot;. Straight up on that one.&amp;lt;br&amp;gt;&lt;br /&gt;
'''How to get there + short sightseeing''': Walk from &amp;quot;T-centralen&amp;quot; along &amp;quot;Drottninggatan&amp;quot; towards Old Town, then towards Slussen and Götgatan. Takes about 30 minutes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hope to meet you there!&lt;br /&gt;
&lt;br /&gt;
== Gala Dinner at City Hall, Wednesday, June 23  ==&lt;br /&gt;
All two-day conference attendees including sponsors are welcome to the official AppSec Gala Dinner at Stockholm City Hall on Wednesday June 23rd. We start with a drink at 6:30 pm and sit down for a three course dinner with entertainment at 7 pm. Don't be late.&lt;br /&gt;
&lt;br /&gt;
'''What''': Gala dinner, three course dinner with entertainment&amp;lt;br&amp;gt;&lt;br /&gt;
'''Clothes''': Nice pants/trousers + shirt or a suit is appropriate for men. Women have so many more choices so we opt-out of any suggestions. :)&amp;lt;br&amp;gt;&lt;br /&gt;
'''When''': 6:30 pm CEST&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where''': City Hall, Ragnar Östbergs plan 1 [http://maps.google.se/maps?um=1&amp;amp;ie=UTF-8&amp;amp;q=stadshuset&amp;amp;fb=1&amp;amp;gl=se&amp;amp;hq=stadshuset&amp;amp;hnear=Stockholm&amp;amp;cid=0,0,15456533754099492758&amp;amp;ei=t8wYTJ7IGd6jOJqd6aEL&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=image&amp;amp;resnum=1&amp;amp;ved=0CB0QnwIwAA Google Maps]&amp;lt;br&amp;gt;&lt;br /&gt;
'''How to get there''': Walk from Central Station / &amp;quot;T-centralen&amp;quot;). Takes about 10 minutes. Or take a taxi/cab and tell the driver &amp;quot;City Hall, please&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whatever you do, don't skip the gala dinner!&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
The venue for both training and conference is Aula Magna at Stockholm University.&lt;br /&gt;
&lt;br /&gt;
'''Address''' (for instance for deliveries):&amp;lt;br&amp;gt;&lt;br /&gt;
Aula Magna&amp;lt;br&amp;gt;&lt;br /&gt;
Stockholms universitet&amp;lt;br&amp;gt;&lt;br /&gt;
Frescativägen 6&amp;lt;br&amp;gt;&lt;br /&gt;
SE-106 91 Stockholm&amp;lt;br&amp;gt;&lt;br /&gt;
Sweden&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Aula Magna.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg|250px|Microsoft - Diamond Sponsor]] [[Image:AppSec Research 2010 Google 20k sponsor.jpg|150px|Google - Dinner Party and Expo Sponsor]] [[Image:Portwise logo.png|130px|PortWise - Gold and Badge Sponsor]] [[Image:Cybercom logo.png|100px|Cybercom - Gold Sponsor]] [[Image:Fortify logo AppSec Research 2010.png|120px|Fortify - Gold Sponsor]] [[Image:Omegapoint logo.png|110px|Omegapoint - Gold Sponsor]] [[Image:Mnemonic logo.png|100px|Mnemonic - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg|100px|NIXU - Silver Sponsor]] [[Image:Hps_logo.png|140px|High Performance Systems - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor F5 logo.jpg|70px|F5 - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Imperva logo.jpg|100px|Imperva - Silver Sponsor]] [[Image:AppSec_Research_2010_sponsor_Promon_logo.jpg|100px|Promon - Silver Sponsor]] [[Image:IIS logo.png|100px|Stiftelsen för Internetinfrastruktur - Lunch Sponsor]] [[Image:MyNethouse logo.png|100px|MyNethouse - Coffee Break Sponsor]] [[Image:AppSec Research 2010 Help Net Security sponsor.jpg|100px|Help Net Security - Media Sponsor]] [[Image:TrustwaveLogo.jpg|100px|Trustwave - Notepad sponsor]]&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
We are still welcoming sponsors for OWASP AppSec Research 2010. Take the opportunity to support this year's major appsec event in Europe! The full sponsoring program is available as pdfs: &lt;br /&gt;
&lt;br /&gt;
Sponsoring program in English:&amp;amp;nbsp;[[Image:OWASP Sponsorship AppSec Research 2010 (eng).pdf]] &lt;br /&gt;
&lt;br /&gt;
Sponsoring program in Swedish:&amp;amp;nbsp;[[Image:OWASP Sponsorship AppSec Research 2010 (swe).pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Challenges  ====&lt;br /&gt;
&lt;br /&gt;
=== Countdown Challenges -- Free Tickets to Win!  ===&lt;br /&gt;
&lt;br /&gt;
There will be a challenge posted on the conference wiki page the 21st every month up until the event. The winner will get free entrance to the conference. Be sure to sign up for [https://lists.owasp.org/mailman/listinfo/appsec_eu_2010 the conference mailing list] to get a monthly reminder.&lt;br /&gt;
&lt;br /&gt;
== AppSec Research Final Challenge: Internet Treasure Hunt  ==&lt;br /&gt;
&lt;br /&gt;
It's May 21st, one month to AppSec Research 2010, and '''the last chance to win a free ticket''' to this year's number one conference in appsec.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The Treasure Hunt in a Nutshell'''&amp;lt;br&amp;gt;&lt;br /&gt;
Your mission is to find several small AppSec Research logotypes hidden among the websites of our sponsors and hosts. Every logo found is associated with a keyword (a dictionary word) in some way. When you've found all the keywords you email them to us.&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp_appsec_research_2010_logo_by_daniel_kozlowski.jpg|40px|OWASP AppSec Research 2010 logo by Daniel Kozlowski]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Instructions'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Please don't do anything malicious during your hunt. And don't produce considerable load on the websites. You should be able to find the keywords anyway :).&lt;br /&gt;
* To check if you found all keywords you compare the md5 of all keywords concatenated in alphabetical order with this hash: 1a7b54ba9cee6cccd9890e7800b83208&lt;br /&gt;
* You can calculate the hash by doing the following in a shell: echo &amp;quot;Keywords concatenated in alphabetical order&amp;quot; | md5&lt;br /&gt;
* To ensure your hash function produces the same as our you can try: echo &amp;quot;owasp&amp;quot; | md5 ... which should result in the hash 2bdce47b1a6c527b134d4b658b033702&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How to Win'''&amp;lt;br&amp;gt;&lt;br /&gt;
To win you email all keywords (not the hash) concatenated in alphabetical order to stefan dot pettersson at owasp dot org. Stefan will let you know if you were the first one with the correct answer!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Example:'''&amp;lt;br&amp;gt;&lt;br /&gt;
* You found three logos and the keywords were: golf, king, apple&lt;br /&gt;
* You calculate the hash by doing: echo &amp;quot;applegolfking&amp;quot; | md5&lt;br /&gt;
* If the hash matches 1a7b54ba9cee6cccd9890e7800b83208 you email applegolfking to Stefan.&lt;br /&gt;
&lt;br /&gt;
Let the best hunter win!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden&amp;diff=85299</id>
		<title>OWASP AppSec Research 2010 - Stockholm, Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden&amp;diff=85299"/>
				<updated>2010-06-23T12:39:23Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
== Invitation  ==&lt;br /&gt;
&lt;br /&gt;
Ladies and Gentlemen, &lt;br /&gt;
&lt;br /&gt;
In June 21-24, 2010 let's all meet in beautiful Stockholm, Sweden. The OWASP chapters in [http://www.owasp.org/index.php/Sweden Sweden], [http://www.owasp.org/index.php/Norway Norway], and [http://www.owasp.org/index.php/Denmark Denmark] hereby invite you to OWASP AppSec Research 2010. &lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email the conference chair: john.wilander at owasp.org &lt;br /&gt;
&lt;br /&gt;
[[Image:Stockholm old town small.jpg]] &lt;br /&gt;
&lt;br /&gt;
=== Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
Diamond sponsor:&amp;lt;br&amp;gt; [[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg]] &lt;br /&gt;
&lt;br /&gt;
Gold sponsors:&amp;lt;br&amp;gt; [[Image:Cybercom logo.png]] [[Image:Portwise logo.png]]&amp;lt;br&amp;gt; [[Image:Fortify logo AppSec Research 2010.png]] [[Image:Omegapoint logo.png]] &lt;br /&gt;
&lt;br /&gt;
Silver sponsors:&amp;lt;br&amp;gt; [[Image:Mnemonic logo.png]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg]] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.hps.se/ http://www.owasp.org/images/6/6f/Hps_logo.png] [[Image:AppSec Research 2010 sponsor F5 logo.jpg]] &amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 sponsor Imperva logo.jpg]] [[Image:AppSec_Research_2010_sponsor_Promon_logo.jpg]]‎ &lt;br /&gt;
&lt;br /&gt;
Dinner Party sponsor:&amp;lt;br&amp;gt; [http://www.google.com/EngineeringEMEA http://www.owasp.org/images/thumb/8/86/AppSec_Research_2010_Google_20k_sponsor.jpg/150px-AppSec_Research_2010_Google_20k_sponsor.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lunch sponsors (1 taken, 1 open):&amp;lt;br&amp;gt; [[Image:IIS logo.png]] &lt;br /&gt;
&lt;br /&gt;
Coffee break sponsors (1 taken, 3 open):&amp;lt;br&amp;gt; [[Image:MyNethouse logo.png]] &lt;br /&gt;
&lt;br /&gt;
Media sponsors:&amp;lt;br&amp;gt; [[Image:AppSec Research 2010 Help Net Security sponsor.jpg]] &lt;br /&gt;
&lt;br /&gt;
Notepad sponsors:&amp;lt;br&amp;gt;&lt;br /&gt;
[[Image:TrustwaveLogo.jpg|Trustwave - Notepad sponsor]]&lt;br /&gt;
&lt;br /&gt;
For full sponsoring program see the Sponsoring tab above.&lt;br /&gt;
&lt;br /&gt;
=== &amp;quot;AppSec Research&amp;quot;.equals(&amp;quot;AppSec Europe&amp;quot;)  ===&lt;br /&gt;
&lt;br /&gt;
This conference was formerly known as OWASP AppSec Europe. We have added 'Research' to highlight that we invite both industry and academia. All the regular AppSec Europe visitors and topics are welcome along with contributions from universities and research institutes. &lt;br /&gt;
&lt;br /&gt;
This will be ''the'' European conference for anyone interested in or working with application security. Co-host is the [http://dsv.su.se/en/ Department of Computer and Systems Science] at Stockholm University, offering a great venue in the fabulous Aula Magna. &lt;br /&gt;
&lt;br /&gt;
=== Countdown Challenges -- Free Tickets to Win!  ===&lt;br /&gt;
&lt;br /&gt;
There will be a challenge posted on the conference wiki page the 21st every month up until the event. The winner will get free entrance to the conference. What are you waiting for? Go to the Challenges tab and have fun! &lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
• John Wilander, chapter leader Sweden (chair)&amp;lt;br&amp;gt; • Mattias Bergling (vice chair)&amp;lt;br&amp;gt; • Alan Davidson, Stockholm University/Royal Institute of Technology (co-host)&amp;lt;br&amp;gt; • Ulf Munkedal, chapter leader Denmark&amp;lt;br&amp;gt; • Kåre Presttun, chapter leader Norway&amp;lt;br&amp;gt; • Stefan Pettersson (sponsoring coordinator)&amp;lt;br&amp;gt; • Carl-Johan Bostorp (schedule and event coordinator)&amp;lt;br&amp;gt; • Martin Holst Swende (coffee/lunch/dinner)&amp;lt;br&amp;gt; • Michael Boman (conference guide/attendee pack)&amp;lt;br&amp;gt; • Predrag Mitrovic, OWASP Sweden Board&amp;lt;br&amp;gt; • Kate Hartmann, OWASP&amp;lt;br&amp;gt; • Sebastien Deleersnyder, OWASP Board &lt;br /&gt;
&lt;br /&gt;
'''Welcome to Stockholm this year!'''&amp;lt;br&amp;gt; Regards, John Wilander &lt;br /&gt;
&lt;br /&gt;
==== June 21-22 (Training)  ====&lt;br /&gt;
&lt;br /&gt;
== Schedule  ==&lt;br /&gt;
10:30-10:50 Coffee break&amp;lt;br&amp;gt;&lt;br /&gt;
12:15-13:00 Lunch in the canteen&amp;lt;br&amp;gt;&lt;br /&gt;
15:00-15:20 Coffee break&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
17:00 End of training for the day&lt;br /&gt;
&lt;br /&gt;
18:00 Monday we'll just go somewhere to eat, Tuesday we have the official meet up at &amp;quot;Mosebacke&amp;quot;. Check the &amp;quot;Social Events&amp;quot; tab above.&lt;br /&gt;
&lt;br /&gt;
== Training Registration is closed  ==&lt;br /&gt;
&lt;br /&gt;
Application security training is given the first two days, '''June 21-22'''. The price was '''€990''' (~$1.350) for a two-day course. 65 people took the chance to learn from the best!&lt;br /&gt;
&lt;br /&gt;
=== Course 1: Threat Modeling and Architecture Review (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Pravir Chandra.jpg]] &lt;br /&gt;
&lt;br /&gt;
Pravir Chandra, Fortify Software &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Threat Modeling and Architecture Review are the cornerstones of a preventative approach to Application Security. By combining these topics into single comprehensive course attendees can get a complete understanding of how to understand the threat an application faces and how the application will handle those potential threats. This enables the risk to be accurately assessed and appropriate changes or mitigating controls recommended. From the course outline:&lt;br /&gt;
&lt;br /&gt;
1. Overview&lt;br /&gt;
* Scope and problem definition&lt;br /&gt;
* High‐level view of the overall process&lt;br /&gt;
* Core techniques&lt;br /&gt;
2. Threat assessment and modeling&lt;br /&gt;
* Overall threat modeling process&lt;br /&gt;
* Preparation and background information&lt;br /&gt;
* Capturing business and security goals&lt;br /&gt;
* Identify vulnerabilities and other risks&lt;br /&gt;
* Establish weighting and prioritization of risks&lt;br /&gt;
* Guard against risks with compensating controls&lt;br /&gt;
* EXERCISE  -  Threat model a real‐life problem&lt;br /&gt;
3. Architecture review techniques&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
* EXERCISE  - Apply the techniques from Authentication and Authorization&lt;br /&gt;
* Input validation&lt;br /&gt;
* Output encoding&lt;br /&gt;
* EXERCISE - Apply the techniques from Input Validation and Output Encoding&lt;br /&gt;
* Error handling&lt;br /&gt;
* Audit logging&lt;br /&gt;
* EXERCISE - Apply the techniques from Error Handling and Audit Logging&lt;br /&gt;
* Encryption&lt;br /&gt;
* Configuration management&lt;br /&gt;
* EXERCISE - Apply the techniques from Encryption and Configuration Management&lt;br /&gt;
4. Specifying security requirements&lt;br /&gt;
* Writing positive security requirements&lt;br /&gt;
* Deriving security requirements from functional requirements&lt;br /&gt;
* Thinking broadly about requirements coverage&lt;br /&gt;
* Balancing security requirements with functionality&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Pravir Chandra is Director of Strategic Services at Fortify where he works with clients to build and optimize software security assurance programs. Pravir is widely recognized in the industry for his expertise in software security and code analysis, and also for his ability to apply technical knowledge strategically from a business perspective. His book, Network Security with OpenSSL is a popular reference on protecting software applications through cryptography and secure communications. His varied special project experience includes creating and leading the Open Software Assurance Maturity Model (OpenSAMM) project &lt;br /&gt;
&lt;br /&gt;
=== Course 2: Introduction to Malware Analysis (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Jason Geffner.jpg]] &lt;br /&gt;
&lt;br /&gt;
Jason Geffner, Next Generation Security Software (NGS), and Scott Lambert, Microsoft &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Security researchers are facing a growing problem in the complexity of malicious executables. While dynamic black-box automation tools exist to discover what malware will do on a given execution, it is often important for an analyst to know the full capabilities of a given malware sample. What port does it listen on? What password does it expect for backdoor access? What files will it write to? What will it do tomorrow that it didn't do today? This class will focus on teaching attendees the steps required to understand the functionality of given malware samples. This is a hands-on course. Attendees will work on real-world malware through a series of lab exercises designed to build their expertise in understanding the analysis process. &lt;br /&gt;
&lt;br /&gt;
Learning Objectives: &lt;br /&gt;
&lt;br /&gt;
*An understanding of how to use reverse engineering tools &lt;br /&gt;
*An understanding of low-level code and data flow &lt;br /&gt;
*PE File format &lt;br /&gt;
*x86 Assembly language &lt;br /&gt;
*API functions often used by malware &lt;br /&gt;
*Anti-analysis tricks and how to defeat them &lt;br /&gt;
*Exploits and Shellcode &lt;br /&gt;
*A methodology for analyzing malware with and without the use of specialized tools&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Jason Geffner joined Next Generation Security Software Ltd. in June of 2007 as a Principal Security Consultant. Jason focuses on performing security reviews of source code and designs, reverse engineering software protection methods and DRM protection methods, deobfuscating and analyzing malware, penetration testing web applications and network infrastructures, and developing automated security analysis tools. &lt;br /&gt;
&lt;br /&gt;
=== Course 3: Building Secure Ajax and Web 2.0 Applications (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Dave Wichers.jpg]] &lt;br /&gt;
&lt;br /&gt;
Dave Wichers, Aspect Security &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This course addresses the special issues with this type of application development. Students will gain hands-on testing experience with freely available web application security test tools to find and diagnose such flaws and learn how to identify, fix, and avoid them in their own projects. In addition, Aspect’s engineers are leaders in the AppSec Community and will offer the students an amazing perspective.&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Dave Wichers is a member of the OWASP Board and a coauthor, along with Jeff Williams, of all previous versions of the OWASP Top Ten. Dave is also the Chief Operating Officer of Aspect Security, a company that specializes in application security services. Mr. Wichers brings over twenty years of experience in the information security field. Prior to cofounding Aspect, he ran the Application Security Services Group at a large data center company, Exodus Communications. His current work involves helping customers, from small e-commerce sites to Fortune 500 corporations and the U.S. Government, secure their applications by providing application security design, architecture, and SDLC support services: including code review, application penetration testing, security policy development, security consulting services, and developer training. &lt;br /&gt;
&lt;br /&gt;
=== Course 4: Assessing and Exploiting Web Apps with Samurai-WTF (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Justin Searle.jpg]] &lt;br /&gt;
&lt;br /&gt;
Justin Searle, InGuardians &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': This course will focus on using open source tools to perform web application assessments. The course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-WTF). Day one will take students through the steps and open source tools used to assess applications for vulnerabilities. Day two will focus on the exploitation of web app vulnerabilities, spending half the day on server side attacks and the other half of the day on client side attacks. The latest tools and techniques will be use throughout the course, including several tools developed by the trainers themselves. From the course outline:&lt;br /&gt;
&lt;br /&gt;
Samurai-WTF Project and Distribution (about, using ...)&amp;lt;br&amp;gt;&lt;br /&gt;
Web Application Assessment Methodology (pentest types, four step methodology ...)&amp;lt;br&amp;gt;&lt;br /&gt;
Step 1: Reconnaissance&lt;br /&gt;
* Overview of Web Application Recon&lt;br /&gt;
* Domain and IP Registration Databases  (Labs: whois)&lt;br /&gt;
* Google Hacking  (Labs: gooscan, gpscan)&lt;br /&gt;
* Social Networks  (Labs: Reconnoiter)&lt;br /&gt;
* DNS Interrogation  (Labs: host, dig, nslookup, fierce)&lt;br /&gt;
Step 2: Mapping&lt;br /&gt;
* Overview of Mapping&lt;br /&gt;
* Port Scanning and Fingerprinting  (Labs: nmap, zenmap, Yokoso!)&lt;br /&gt;
* Web Service Scanning  (Labs: Nikto)&lt;br /&gt;
* Spidering  (Labs: wget, curl, Paros, WebScarab, BurpSuite)&lt;br /&gt;
* Discovering &amp;quot;Non-Discoverable&amp;quot; URLs  (Labs: DirBuster)&lt;br /&gt;
Step 3: Discovery&lt;br /&gt;
* Using Built-in Tools  (Labs: Page Info, Error Console, DOM Inspector, View Source)&lt;br /&gt;
* Poking and Prodding  (Labs: Default User Agent, Cookie Editor, Tamper Data)&lt;br /&gt;
* Interception Proxies  (Labs: Paros, WebScarab, BurpSuite)&lt;br /&gt;
* Semi-Automated Discovery  (Labs: RatProxy)&lt;br /&gt;
* Automated Discovery  (Labs: Grendel-Scan, w3af)&lt;br /&gt;
* Information Discovery  (Labs: CeWL)&lt;br /&gt;
* Fuzzing  (Labs: JBroFuzz, BurpIntruder)&lt;br /&gt;
* Finding XSS  (Labs: TamperData, XSS-Me, BurpIntruder)&lt;br /&gt;
* Finding SQL Injection  (Labs: SQL Inject-Me, SQL Injection, BurpIntruder)&lt;br /&gt;
* Decompiling Flash Objects  (Labs: Flare)&lt;br /&gt;
Step 4: Exploitation&lt;br /&gt;
* Username Harvesting  (Labs: python)&lt;br /&gt;
* Brute Forcing Passwords  (Labs: python)&lt;br /&gt;
* Command Injection  (Labs: w3af)&lt;br /&gt;
* Exploiting SQL Injection  (Labs: SQLMap, SQLNinja, Laudanum)&lt;br /&gt;
* Exploiting XSS  (Labs: Durzosploit)&lt;br /&gt;
* Browser Exploitation  (Labs: BeEF, BrowserRider, Yokoso!)&lt;br /&gt;
* Advanced exploitation through tool integration (MSF + sqlninga/sqlmap/BeEF)&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Justin Searle, a Senior Security Analyst with InGuardians, specializes in web application, network, and embedded penetration testing. Justin has presented at top security conferences including DEFCON, ToorCon, ShmooCon, and SANS. Justin has an MBA in International Technology and is CISSP and SANS GIAC-certified in incident handling and hacker techniques (GCIH) and intrusion analysis (GCIA). Justin is one of the founders and lead developers of Samurai-WTF. &lt;br /&gt;
&lt;br /&gt;
=== Course 5: Securing Web Services (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Jason Li.jpg]] &lt;br /&gt;
&lt;br /&gt;
Jason Li, Aspect Security &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Aspect Security offers this two day Securing Web Services course which focuses on the most important messages regarding the development of secure web services. This course helps developers understand the real risks associated with Security in Web Services and Service Oriented Architectures, what standard are available to help, and how to use the standards. The course includes a combination of lecture, demonstrations, and hands on testing designed to provide detailed guidance regarding the implementation of specific security principles and functions in web services.&lt;br /&gt;
&lt;br /&gt;
From the course outline:&lt;br /&gt;
&lt;br /&gt;
* Web Service and SOA Threat Model&lt;br /&gt;
* Data Formats: XML, JSON&lt;br /&gt;
* Protocols: SOAP, REST&lt;br /&gt;
* Overview of the Standards (WS-Security, SAML, XACML)&lt;br /&gt;
* Common Communications Vulnerabilities&lt;br /&gt;
* Using SSL for Simple Web Services&lt;br /&gt;
* XML Encryption&lt;br /&gt;
* XML Signature&lt;br /&gt;
* WS-Security&lt;br /&gt;
* How to Manage Web Service Identities&lt;br /&gt;
* Federated Identities&lt;br /&gt;
* Common Authentication Vulnerabilities&lt;br /&gt;
* WSDL Examples of Implementing WS-Security&lt;br /&gt;
* Common Access Control Vulnerabilities&lt;br /&gt;
* How to Validate Web Service Input (XML Schema, Business Logic Validation)&lt;br /&gt;
* Common XML Attacks (Recursion, References, Overflow, Transforms)&lt;br /&gt;
* State Management&lt;br /&gt;
* Using Interpreters Safely (SQL Injection, LDAP Injection, Command Injection, XPath Injection)&lt;br /&gt;
* Denial of Service and Availability&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Jason Li is a Senior Application Security Engineer for Aspect Security where he performs application security assessments and architecture reviews, as well as application security training, to a wide variety of financial and government customers. Jason is an active OWASP leader, contributing to several OWASP projects and serving on the OWASP Global Projects Committee. He holds a Post-Masters certificate in Computer Science and concentration in Information Security from Johns Hopkins University and a Masters degree in Computer Science from Cornell University. &lt;br /&gt;
&lt;br /&gt;
==== June 23  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - June 23, 2010''' &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] = Research paper [[Image:OWASP AppSec Research 2010 Demo D.gif]] = Demo [[Image:OWASP AppSec Research 2010 Presentation P.gif]] = Presentation &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-08:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:50-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec Research 2010 Conference (John Wilander &amp;amp;amp; [http://www.owasp.org/index.php/About_OWASP OWASP Global Board Members])&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | [[#Keynote: Cross-Domain Theft and the Future of Browser Security]] &lt;br /&gt;
''Chris Evans, Information Security Engineer, and Ian Fette, Product Manager for Chrome Security, Google'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:45 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#BitFlip: Determine a Data's Signature Coverage from Within the Application]] &lt;br /&gt;
''Henrich Christopher Poehls, University of Passau''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#CsFire: Browser-Enforced Mitigation Against CSRF]] &lt;br /&gt;
''Lieven&amp;amp;nbsp;Desmet&amp;amp;nbsp;and&amp;amp;nbsp;Philippe&amp;amp;nbsp;De&amp;amp;nbsp;Ryck,&amp;amp;nbsp;Katholieke Universiteit Leuven''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Deconstructing ColdFusion]] &lt;br /&gt;
''Chris Eng,&amp;amp;nbsp;Veracode'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:45-11:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off, '''Coffee break sponsoring position open''' ($2,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:10-11:45 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Towards Building Secure Web Mashups]] &lt;br /&gt;
''M Decat, P De Ryck, L Desmet, F Piessens, W Joosen,&amp;amp;nbsp;Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#New Insights into Clickjacking]] &lt;br /&gt;
''Marco Balduzzi,&amp;amp;nbsp;Eurecom&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#How to Render SSL Useless]] ([[Media:Ivan_Ristic_-_Breaking_SSL_-_OWASP.pdf PDF]])&lt;br /&gt;
''Ivan Ristic, Qualys&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:55-12:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Busting Frame Busting]] &lt;br /&gt;
&lt;br /&gt;
''Gustav Rydstedt,&amp;amp;nbsp;Stanford Web Security Research''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Web Frameworks and How They Kill Traditional Security Scanning]] &lt;br /&gt;
''Christian Hang and Lars Andren,&amp;amp;nbsp;Armorize Technologies'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#The State of SSL in the World]] &lt;br /&gt;
''Michael Boman, Omegapoint&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:30-13:45 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF, Lunch sponsor: [[Image:OWASP AppSec Research 2010 IIS logo for program.png]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:45-14:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#(New) Object Capabilities and Isolation of Untrusted Web Applications]] &lt;br /&gt;
''Sergio Maffeis, Imperial College, London'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Beyond the Same-Origin Policy]] &lt;br /&gt;
''Jasvir Nagra and Mike Samuel, Google&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#SmashFileFuzzer - a New File Fuzzer Tool]] &lt;br /&gt;
''Komal Randive, Symantec'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:30-15:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Security Toolbox for .NET Development and Testing]] &lt;br /&gt;
''Johan Lindfors and Dag König, Microsoft'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Cross-Site Location Jacking (XSLJ) (not really)]] &lt;br /&gt;
''David Lindsay, Cigital&amp;lt;br&amp;gt;Eduardo Vela Nava,&amp;amp;nbsp;sla.ckers.org''&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Owning Oracle: Sessions and Credentials]] &lt;br /&gt;
''Wendel G. Henrique and Steve Ocepek, Trustwave'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:05-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF, '''Coffee break sponsoring position open''' ($2,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Value Objects a la Domain-Driven Security: A Design Mindset to Avoid SQL Injection and Cross-Site Scripting]] &lt;br /&gt;
''Dan Bergh Johnsson, Omegapoint'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Automated vs. Manual Security: You Can't Filter &amp;quot;The Stupid&amp;quot;]]&amp;lt;br&amp;gt; &lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave''&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Session Fixation - the Forgotten Vulnerability?]] &lt;br /&gt;
''Michael Schrank and Bastian Braun, University of Passau&amp;lt;br&amp;gt;Martin Johns, SAP Research'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: To Be Announced&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 19:00-23:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(43, 58, 109);&amp;quot; | [[Image:OWASP_AppSec_Research_2010_Stockholm_City_Hall_exterior_small.jpg|Stockholm City Hall, photo by Yanan Li]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(43, 58, 109); color: white;&amp;quot; | '''Gala Dinner''' at [http://international.stockholm.se/Tourism-and-history/The-Famous-City-Hall/Pictures-of-the-City-Hall/ &amp;lt;span style=&amp;quot;color:rgb(163, 178, 229);&amp;quot;&amp;gt;Stockholm City Hall&amp;lt;span&amp;gt;]&amp;lt;br&amp;gt;Sponsored by&amp;lt;br&amp;gt;[[Image:OWASP AppSec Research 2010 Google logo for program.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(43, 58, 109);&amp;quot; | [[Image:OWASP_AppSec_Research_2010_Stockholm_City_Hall_Golden_Hall_small.jpg|The Golden Hall, photo by Yanan Li]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg|250px|Microsoft - Diamond Sponsor]] [[Image:AppSec Research 2010 Google 20k sponsor.jpg|150px|Google - Dinner Party and Expo Sponsor]] [[Image:Portwise logo.png|130px|PortWise - Gold and Badge Sponsor]] [[Image:Cybercom logo.png|100px|Cybercom - Gold Sponsor]] [[Image:Fortify logo AppSec Research 2010.png|120px|Fortify - Gold Sponsor]] [[Image:Omegapoint logo.png|110px|Omegapoint - Gold Sponsor]] [[Image:Mnemonic logo.png|100px|Mnemonic - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg|100px|NIXU - Silver Sponsor]] [[Image:Hps_logo.png|140px|High Performance Systems - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor F5 logo.jpg|70px|F5 - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Imperva logo.jpg|100px|Imperva - Silver Sponsor]] [[Image:AppSec_Research_2010_sponsor_Promon_logo.jpg|100px|Promon - Silver Sponsor]] [[Image:IIS logo.png|100px|Stiftelsen för Internetinfrastruktur - Lunch Sponsor]] [[Image:MyNethouse logo.png|100px|MyNethouse - Coffee Break Sponsor]] [[Image:AppSec Research 2010 Help Net Security sponsor.jpg|100px|Help Net Security - Media Sponsor]] [[Image:TrustwaveLogo.jpg|100px|Trustwave - Notepad sponsor]]&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Keynote: Cross-Domain Theft and the Future of Browser Security  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec research 2010 invited talk 1.jpg]] &lt;br /&gt;
&lt;br /&gt;
'''Chris Evans'''&amp;lt;br&amp;gt; Troublemaker, Information Security Engineer, and Tech Lead at Google inc.&amp;lt;br&amp;gt; Also the sole author of vsftpd. &lt;br /&gt;
&lt;br /&gt;
'''Ian Fette'''&amp;lt;br&amp;gt; Product Manager for Chrome Security and Google's Anti-Malware initiative &lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&amp;lt;br&amp;gt; The web browser, and associated machinery, is on the front line of attacks. We will first look at design-level problems with the traditional browser in terms of monolithic architecture and fundamental problems with the same-origin policy. We will then look at the types of solution that are starting to appear in browsers such as Google Chrome and Internet Explorer. We will look at other important browser-based defenses such as Safe Browsing. We will detail what a future browser might look like that has a much more secure design, but is still usable on the wide variety of web sites that people use daily. &lt;br /&gt;
&lt;br /&gt;
== DAY 1, TRACK 1  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] BitFlip: Determine a Data's Signature Coverage from Within the Application  ===&lt;br /&gt;
&lt;br /&gt;
''Henrich Christopher Poehls, University of Passau - ISL'' &lt;br /&gt;
&lt;br /&gt;
Despite applied cryptographic primitives applications are working on data that was not protected by them. We show by abstracting the message flow between the application and the underlying wire, that protection is applied to a different data model. Taking problems from real life, like XML wrapping attacks and digital signatures on XML, we show that establishing the right linkage between the security checked on lower levels and the application above is practically difficult. We propose a application controlled check, the BitFlip-test. By this simple test an application can test if the application's assumed protection of a data value was indeed provided by the digital signature applied to the message that contained the value. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Towards Building Secure Web Mashups  ===&lt;br /&gt;
&lt;br /&gt;
''Maarten Decat, Philippe De Ryck, Lieven Desmet, Frank Piessens, and Wouter Joosen, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
Web mashups combine components from multiple sources into a single, interactive application. This kind of setup typically requires both interaction between the components to achieve the necessary functionality, as well as component separation to achieve a secure execution. Unfortunately, the traditional web is not designed to easily fulfill both requirements, which can be seen in the restrictions imposed by traditional development techniques. This paper gives an overview of these traditional techniques and investigates new developments, specifically aimed at combining components in a secure manner. In addition, topics for further improvement are identified to ensure a wide adaptation of secure mashups. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Busting Frame Busting  ===&lt;br /&gt;
&lt;br /&gt;
''Gustav Rydstedt, Stanford Web Security Research''&amp;lt;br&amp;gt;&lt;br /&gt;
Joint work with Elie Bursztein, Dan Boneh, and Collin Jackson.&lt;br /&gt;
&lt;br /&gt;
Web framing attacks such as clickjacking use iframes to hijack a user's web session. The most common defense, called frame busting, prevents a site from functioning when loaded inside a frame. We study frame busting practices for the Alexa Top-500 sites and show that all can be circumvented in one way or another. Some circumventions are browser-specific while others work across browsers. We conclude with recommendations for proper frame busting.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] (New) Object Capabilities and Isolation of Untrusted Web Applications ===&lt;br /&gt;
&lt;br /&gt;
''Sergio Maffeis, Imperial College, London'' &lt;br /&gt;
&lt;br /&gt;
The object-capability model provides an appealing approach for isolating untrusted content in mashups: if untrusted applications are provided disjoint capabilities they still can interact with the user or the hosting page, but they cannot directly interfere with each other. We develop language-based foundations for isolation proofs based on object-capability concepts, and we show the applicability of our framework for a specific class of mashups. As an application, we prove that a JavaScript subset based on Google Caja is capability safe.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Security Toolbox for .NET Development and Testing  ===&lt;br /&gt;
&lt;br /&gt;
''Johan Lindfors and Dag König, Microsoft'' &lt;br /&gt;
&lt;br /&gt;
Being a developer on the Microsoft platform leveraging .NET doesn’t only involve keeping up with the continuous development of the underlying framework and technologies. It also means to be on top of the latest security threats and naturally the available mitigations and best practices to protect the customers and users of the applications and solutions being developed. &lt;br /&gt;
&lt;br /&gt;
In this session we will demonstrate how you as a .NET developer can leverage existing tools and technologies to build safer applications. During the demonstrations you will get more familiar with the existing tools within Visual Studio but also be introduced and educated in more tools that will help you build a toolbox for secure development and security testing. &lt;br /&gt;
&lt;br /&gt;
But one must also remember that tools will never replace knowledge and hence we will also show you how you can regularly get updated with the latest information from Microsoft on security including how to leverage SDL – Security Development Lifecycle, within your own projects. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Value Objects a la Domain-Driven Security: A Design Mindset to Avoid SQL Injection and Cross-Site Scripting  ===&lt;br /&gt;
&lt;br /&gt;
''Dan Bergh Johnsson, Omegapoint'' &lt;br /&gt;
&lt;br /&gt;
SQL Injection and Cross-Site Scripting have been topping the OWASP Top Ten for the last years. It must be a top priority for the community to evolve designs and mindsets that help the programmers to avoid these traps in their day-to-day work, where they have so much else but security that calls for their attention. The ambition of this presentation is to show design and coding practices that are well established in other fields of software development and put them to use to avoid just-mentioned traps. We also show some small refactorings that can be immediately applied to an existing codebase to make significant improvements to its security. Attendants of the session should be able to go back to work Monday morning and finish an improvement in this style before Monday lunch. &lt;br /&gt;
&lt;br /&gt;
We take inspiration from Domain Driven Design (DDD), which is characterized by its focus on what the software intend to represent. In particular, we make heavy use of the Value Object design pattern, where strict typing help us enforce that the incoming data is truthful to the restrictions of the domain. We start out with Injection Flaws and use the canonical username SQL Injection attack (“’OR 1=1 --“) as an example. Realizing that mentioned string was not intended as a valid username we elaborate the model to reflect this. Further more we make this change explicit in the code by introducing the new type and class Username. This also gives a natural place to put validation code, which otherwise often is placed in utility classes where it is easily forgotten and seldom called. In fact, we can even design service methods to require a validated Username, thus using the strong typing to enforce validation in the calling client system tier. &lt;br /&gt;
&lt;br /&gt;
Making this re-design with associated code changes is performed as a demo, and en route we discuss other design options and their relative merits and drawbacks. Again using DDD we proceed to analyse XSS. In the same way we see that XSS is in the general case not an indata validation problem. An extended analysis proposes that it can be phrased as an output-encoding problem. Using a similar technique we model the target domain of web content as the new type HTMLString, and can thereby enforce conversion from ordinary strings to strings with the proper encoding. If you have multiple content channels, then each channel will. &lt;br /&gt;
&lt;br /&gt;
All steps needed are shown in code, starting with a vulnerable application and through controlled refactoring steps ending up with a version without the vulnerability. In summary, we will take an established quality practice from another field of software development and use it to get security improvements. The main benefits are two: firstly, the method gently guides and reminds the programmers to include validation and encoding in an unobtrusive way. Secondly, the work can be performed in very small steps, where the first can be finished before lunch Monday after the conference. &lt;br /&gt;
&lt;br /&gt;
== DAY 1, TRACK 2  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] CsFire: Browser-Enforced Mitigation Against CSRF  ===&lt;br /&gt;
&lt;br /&gt;
''Lieven Desmet and Philippe De Ryck, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
Cross-Site Request Forgery (CSRF) is a web application attack vector that can be leveraged by an attacker to force an unwitting user's browser to perform actions on a third party website, possibly reusing all cached authentication credentials of that user. &lt;br /&gt;
&lt;br /&gt;
Currently, a whole range of techniques exist to mitigate CSRF, either by protecting the server application or by protecting the end-user. Unfortunately, the server-side protection mechanisms are not yet widely adopted, and the client-side solutions provide only limited protection or cannot deal with complex web 2.0 applications, which use techniques such as AJAX, mashups or single sign-on (SSO). &lt;br /&gt;
&lt;br /&gt;
In this talk, we will presents three interesting results of our research: (1) an extensive, real‐world traffic analysis to gain more insights in cross‐domain web interactions, (2) requirements for client‐side mitigation against CSRF and an analysis of existing browser extensions and (3) CsFire, our newly developed FireFox extension to mitigate CSRF. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Automated vs. Manual Security: You Can't Filter &amp;quot;The Stupid&amp;quot;  ===&lt;br /&gt;
&lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave'' &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
Automated tools certainly have some strengths (namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks). In addition to preventing some attacks, WAFs also have advantages for some compliance frameworks. However, automated solutions are far from perfect. To begin with, there are entire classes of very important vulnerabilities that are theoretically impossible for automated software to detect (at least until HAL comes online). Examples include complex information leakage, race conditions, logic flaws, design flaws, subjective vulnerabilities such as CSRF, and multistage process attacks. &lt;br /&gt;
&lt;br /&gt;
Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. Automated tools are designed to cover common application designs and platforms. Applications using an unusual layout or components will not be thoroughly protected by automated tools. Realistically, only the most vanilla of web applications written on common, simple platforms will receive solid code coverage from an automated tool. &lt;br /&gt;
&lt;br /&gt;
On the other hand, manual testing is far more versatile. An experienced penetration tester can identify complicated vulnerabilities in the same way that an attacker does. Specific, real-world examples of vulnerabilities only recognizable by humans will be provided. The diversity of vulnerabilities shown will clearly demonstrate that all applications have the potential for significant vulnerabilities not detectable by automated tools. &lt;br /&gt;
&lt;br /&gt;
Manual source code reviews present even more benefits by identifying vulnerabilities that require access to source code. Examples include “hidden” or unused application components, SQL injection with no evidence in the response, exotic injection attacks (e.g. mainframe session attacks), vulnerabilities in back-end systems, and intentional backdoors. Many organizations assume that this type of vulnerability is not a large threat, but source code can be obtained by disgruntled developers, by internal attackers when the repository isn’t properly secured, by exploiting platform bugs or path directory traversal attacks, and by external attackers using a Trojan horse or similar technique. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Web Frameworks and How They Kill Traditional Security Scanning  ===&lt;br /&gt;
&lt;br /&gt;
''Christian Hang and Lars Andren, Armorize Technologies'' &lt;br /&gt;
&lt;br /&gt;
Modern web application frameworks present a challenge to static analysis technologies due to how they influence application behavior in ways not obvious from the source code. This prevents efficient security scanning and can cause up to 80% of total potential issues to remain undetected due to the incorrect framework handling. After explaining the underlying problems, we demonstrate in a real world walk through using code analysis to scan actual application code. By extending static analysis with new framework specific components, even applications using complex frameworks like Struts and Smarty can be inspected automatically and code coverage of security analysis can be greatly enhanced. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Beyond the Same-Origin Policy  ===&lt;br /&gt;
&lt;br /&gt;
''Jasvir Nagra and Mike Samuel, Google Inc'' &lt;br /&gt;
&lt;br /&gt;
The same-origin policy has governed interaction between client-side code and user data since Netscape 2.0, but new development techniques are rendering it obsolete. Traditionally, a website consisted of server-side code written by trusted, in-house developers&amp;amp;nbsp;; and a minimum of client-side code written by the same in-house devs. The same-origin policy worked because it didn't matter whether code ran server-side or client-side&amp;amp;nbsp;; the user was interacting with code produced by the same organization. But today, complex applications are being written almost entirely in client-side code requiring developers to specialize and share code across organizational boundaries. &lt;br /&gt;
&lt;br /&gt;
This talk will explain how the same-origin policy is breaking down, give examples of attacks, discuss the properties that any alternative must have, introduce a number of alternative models being examined by the Secure EcmaScript committee and other standards bodies, demonstrate how they do or don't thwart these attacks, and discuss how secure interactive documents could open up new markets for web developers. We assume a basic familiarity with web application protocols&amp;amp;nbsp;: HTTP, HTML, JavaScript, CSS&amp;amp;nbsp;; and common classes of attacks&amp;amp;nbsp;: XSS, XSRF, Phishing. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Cross-Site Location Jacking (XSLJ) (not really)  ===&lt;br /&gt;
&lt;br /&gt;
''David Lindsay, Cigital Inc, and Eduardo Vela Nava sla.ckers.org'' &lt;br /&gt;
&lt;br /&gt;
Redirects are commonly used on many websites and are an integral part of many web frameworks. However, subtle and not so subtle issues can lead to security holes and privacy issues. In this presentation, we will discuss several high and low level issues related to redirects and demonstrate how the issues can be exploited. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] New Insights into Clickjacking  ===&lt;br /&gt;
&lt;br /&gt;
''Marco Balduzzi, Eurecom'' &lt;br /&gt;
&lt;br /&gt;
Over the past year, clickjacking received extensive media coverage. News portals and security forums have been overloaded by posts claiming clickjacking to be the upcoming security threat. In a clickjacking attack, a malicious page is constructed (or a benign page is hijacked) to trick the user into performing unintended clicks that are advantageous for the attacker, such as propagating a web worm, stealing confidential information or abusing of the user session. In this talk, we formally define the problem and introduce our novel solution for automated detection of clickjacking attacks. We present the details of the system architecture and its implementation, and we evaluate the results we obtained from the analysis of over a million unique Internet pages. We conclude by discussing the clickjacking phenomenon and its future implications. &lt;br /&gt;
&lt;br /&gt;
== DAY 1, TRACK 3  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Deconstructing ColdFusion  ===&lt;br /&gt;
&lt;br /&gt;
''Chris Eng, Veracode'' &lt;br /&gt;
&lt;br /&gt;
This presentation is a technical survey of ColdFusion security, which will be of interest mostly to code auditors and penetration testers. We’ll cover the basics of ColdFusion markup, control flow, functions, and components and demonstrate how to identify common web application vulnerabilities at the source code level. We’ll also delve into ColdFusion J2EE internals, describing some of the unexpected properties we’ve observed while decompiling ColdFusion applications for static analysis. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] How to Render SSL Useless  ===&lt;br /&gt;
&lt;br /&gt;
''Ivan Ristic, Feisty Duck'' &lt;br /&gt;
&lt;br /&gt;
SSL is the technology that secures the Internet, but it is effective only when deployed properly. While the SSL protocol itself is very robust and easy to use, the same cannot be said for the usability of the complete ecosystem, which includes server configuration, certificates and application implementation details. In fact, SSL deployment is generally plagued with traps at every step of the way. As a result, too many web sites use insecure deployment practices that render SSL completely useless. In this talk I will present a list of top ten (or thereabout) deployment mistakes, based on my work on the SSL Labs assessment platform (https://www.ssllabs.com). &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] The State of SSL in the World  ===&lt;br /&gt;
&lt;br /&gt;
''Michael Boman, Omegapoint'' &lt;br /&gt;
&lt;br /&gt;
What is the status of SSL deployments in Fortune 500 companies and the top 10'000 websites (according to Alexa)? While developing a tool that was needed to perform the test-case OWASP-CM-001 (Testing for SSL-TLS) it was noticed that some sites had very good SSL-configuration, sometimes unexpectedly, and some sites has very poor security configuration, even when you could expect the site to have good security standard. Does the organization behind the site has any bearing on how good the security standard the site has in regards to HTTPS-support and configuration? The talk will highlight the findings and the tools and process of obtaining the underlying data, while also trying to answer the questions: - How many of the Fortune 500 and Top 10'000 websites offer an HTTPS-enabled browser experience to their visitors? - How is the HTTPS-server configured in regards to SSL-protocols offered, key exchange and key lengths (bit-size)? - Are there any correlation between company size, industry or popularity and the HTTPS-enabled browsing experience and the HTTPS-configuration? &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] SmashFileFuzzer - a New File Fuzzer Tool  ===&lt;br /&gt;
&lt;br /&gt;
''Komal Randive, Symantec'' &lt;br /&gt;
&lt;br /&gt;
Here is a tool SmashFileFuzzer designed and developed to address the same problem with ease. SmashFileFuzzer understands the file formats and then user can specify the fields in the file to be fuzzed. SmashFileFuzzer acts on a sample file of the required format and generates multiple fuzzed file copies from this sample file. SmashFileFuzzer also has the support to add more custom file formats to be able to fuzz them, especially .dat formats. In comparison with the existing file fuzzers and frameworks this fuzzer has simple language for adding new formats, many more modes of fuzzing and attack oriented fuzzing. Following are the highlights of this fuzzer &lt;br /&gt;
&lt;br /&gt;
*Support to understand the file formats and fuzz specific fields with specified/random data &lt;br /&gt;
*Understands the correlation between different fields and manipulates them in accordance with the fuzzed content. &lt;br /&gt;
*Can generate valid fuzzed files even based on the partial format understanding. Only the portions of file format which are understood by the user can be used to generate valid fuzzed files. &lt;br /&gt;
*Understands the custom formats for file types and also for the configuration files(e.g key value pair format or .dat formats) &lt;br /&gt;
*Tool is designed to be easily extended for any new file formats &lt;br /&gt;
*Fuzz strings are read from a dictionary file. Users can add application specific input string to this dictionary for testing. &lt;br /&gt;
*It’s a unix shell based tool which can be easily scripted.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Owning Oracle: Sessions and Credentials  ===&lt;br /&gt;
&lt;br /&gt;
''Wendel G. Henrique and Steve Ocepek, Trustwave'' &lt;br /&gt;
&lt;br /&gt;
In a world of free, ever-present encryption libraries, many penetration testers still find a lot of great stuff on the wire. Database traffic is a common favorite, and with good reason: when the data includes PAN, Track, and CVV, it makes you stop and wonder why this stuff isn’t encrypted across the board. However, despite this weakness, we still need someone to issue queries before we see the data. Or maybe not… after all, it’s just plaintext. &lt;br /&gt;
&lt;br /&gt;
Wendel G. Henrique and Steve Ocepek of Trustwave’s SpiderLabs division offer a closer look at the world’s most popular relational database: Oracle. Through a combination of downgrade attacks and session take-over exploits, this talk introduces a unique approach to database account hijacking. Using a new tool, thicknet, the team will demonstrate how deadly injection and downgrade attacks can be to database security. &lt;br /&gt;
&lt;br /&gt;
The Oracle TNS/Net8 protocol was studied extensively during presentation for this talk. Very little public knowledge of this protocol exists today, and much of the data gained is, as far as we know, new to Oracle outsiders. &lt;br /&gt;
&lt;br /&gt;
Also, during the presentation we will be offering to attendants: &lt;br /&gt;
&lt;br /&gt;
*Knowledge about man-in-the-middle and downgrade attacks, especially the area of data injection. &lt;br /&gt;
*A better understanding of the network protocol used by Oracle. &lt;br /&gt;
*The ability to audit databases against this type of attack vector. &lt;br /&gt;
*Ideas for how to prevent this type of attack, and an understanding of the value of encryption and digital signature technologies. &lt;br /&gt;
*Understanding of methodologies used to reverse-engineer undocumented protocols.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Session Fixation - the Forgotten Vulnerability?  ===&lt;br /&gt;
&lt;br /&gt;
''Michael Schrank and Bastian Braun, University of Passau, and Martin Johns, SAP Research'' &lt;br /&gt;
&lt;br /&gt;
The term 'Session Fixation vulnerability' subsumes issues in Web applications that under certain circumstances enable the adversary to perform a session hijacking attack through ontrolling the victim's session identier value. We explore this vulnerability pattern. First, we give an analysis of the root causes and document existing attack vectors. Then we take steps to assess the current attack surface of Session Fixation. Finally, we present a transparent server-side method for mitigating vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== June 24  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''Conference Day 2 - June 24, 2010''' &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] = Research paper [[Image:OWASP AppSec Research 2010 Demo D.gif]] = Demo [[Image:OWASP AppSec Research 2010 Presentation P.gif]] = Presentation &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-08:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Breakfast + Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-10:00 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:rgb(252, 252, 150)&amp;quot; align=&amp;quot;center&amp;quot; | [[#Keynote: The Security Development Lifecycle - The Creation and Evolution of a Security Development Process]]&amp;lt;br&amp;gt;''Steve Lipner, Senior Director of Security Engineering Strategy, Microsoft Corporation''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:10-10:45 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#The Anatomy of Real-World Software Security Programs]] &lt;br /&gt;
&lt;br /&gt;
''Pravir Chandra, Fortify'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Promon TestSuite: Client-Based Penetration Testing Tool]] &lt;br /&gt;
&lt;br /&gt;
''Folker den Braber and Tom Lysemose Hansen, Promon'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#A Taint Mode for Python via a Library]] &lt;br /&gt;
&lt;br /&gt;
''Juan José Conti, Universidad Tecnológica Nacional&amp;lt;br&amp;gt;Alejandro Russo, Chalmers Univ. of Technology'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:45-11:10 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:90%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF, Coffee sponsor: [[Image:OWASP AppSec Research 2010 MyNethouse logo for program.png]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:10-11:45 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Microsoft's Security Development Lifecycle for Agile Development]] &lt;br /&gt;
&lt;br /&gt;
''Nick Coblentz, OWASP Kansas City Chapter and AT&amp;amp;T Consulting'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Detecting and Protecting Your Users from 100% of all Malware - How?]] &lt;br /&gt;
&lt;br /&gt;
''Bradley Anstis and Vadim Pogulievsky, M86 Security'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#OPA: Language Support for a Sane, Safe and Secure Web]] &lt;br /&gt;
&lt;br /&gt;
''David Rajchenbach-Teller and François-Régis Sinot, MLstate'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:55-12:30 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Secure Application Development for the Enterprise: Practical, Real-World Tips]] &lt;br /&gt;
&lt;br /&gt;
''Michael Craigue, Dell'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Responsibility for the Harm and Risk of Software Security Flaws]] &lt;br /&gt;
&lt;br /&gt;
''Cassio Goldschmidt, Symantec'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Secure the Clones: Static Enforcement of Policies for Secure Object Copying]] &lt;br /&gt;
&lt;br /&gt;
''Thomas Jensen and David Pichardie, INRIA Rennes - Bretagne Atlantique'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF, '''Lunch break sponsoring position open''' ($4,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:20 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Product Security Management in Agile Product Management]] &lt;br /&gt;
&lt;br /&gt;
''Antti Vähä-Sipilä, Nokia'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Hacking by Numbers]] &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan, WhiteHat Security and OWASP Foundation&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Safe Wrappers and Sane Policies for Self Protecting JavaScript]] &lt;br /&gt;
&lt;br /&gt;
''Jonas Magazinius, Phu H. Phung, and David Sands, Chalmers Univ. of Technology'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:05 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#OWASP_Top_10_2010]] &lt;br /&gt;
&lt;br /&gt;
''Dave Wichers, Aspect Security and OWASP Foundation&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Application Security Scoreboard in the Sky]] &lt;br /&gt;
&lt;br /&gt;
''Chris Eng, Veracode'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#On the Privacy of File Sharing Services]] &lt;br /&gt;
&lt;br /&gt;
''N Nikiforakis, F Gadaleta, Y Younan, and W Joosen, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:05-15:30 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF, '''Coffee break sponsoring position open''' ($2,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:00 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:90%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | CTF Price Ceremony, Announcement of OWASP AppSec EU 2011, Closing Notes&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg|250px|Microsoft - Diamond Sponsor]] [[Image:AppSec Research 2010 Google 20k sponsor.jpg|150px|Google - Dinner Party and Expo Sponsor]] [[Image:Portwise logo.png|130px|PortWise - Gold and Badge Sponsor]] [[Image:Cybercom logo.png|100px|Cybercom - Gold Sponsor]] [[Image:Fortify logo AppSec Research 2010.png|120px|Fortify - Gold Sponsor]] [[Image:Omegapoint logo.png|110px|Omegapoint - Gold Sponsor]] [[Image:Mnemonic logo.png|100px|Mnemonic - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg|100px|NIXU - Silver Sponsor]] [[Image:Hps_logo.png|140px|High Performance Systems - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor F5 logo.jpg|70px|F5 - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Imperva logo.jpg|100px|Imperva - Silver Sponsor]] [[Image:AppSec_Research_2010_sponsor_Promon_logo.jpg|100px|Promon - Silver Sponsor]] [[Image:IIS logo.png|100px|Stiftelsen för Internetinfrastruktur - Lunch Sponsor]] [[Image:MyNethouse logo.png|100px|MyNethouse - Coffee Break Sponsor]] [[Image:AppSec Research 2010 Help Net Security sponsor.jpg|100px|Help Net Security - Media Sponsor]] [[Image:TrustwaveLogo.jpg|100px|Trustwave - Notepad sponsor]]&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
== Keynote: The Security Development Lifecycle - The Creation and Evolution of a Security Development Process  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec research 2010 invited talk 2.jpg]] &lt;br /&gt;
&lt;br /&gt;
'''Steve Lipner'''&amp;lt;br&amp;gt; Senior Director of Security Engineering Strategy, Trustworthy Computing Security, Microsoft Corporation.&amp;lt;br&amp;gt; Co-author of &amp;quot;The Security Development Lifecycle&amp;quot;, Microsoft Press (book cover above). &lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&amp;lt;br&amp;gt; This keynote will review the evolution of the Security Development Lifecycle (SDL) from its origins in the Microsoft “security pushes” of 2002-3 through its current status and application in 2010. It will emphasize the aspects of change and change management as the SDL and its user community have matured and grown and will conclude with a summary of some recent changes and additions to the SDL. Specific topics to be addressed include: &lt;br /&gt;
&lt;br /&gt;
*Motivations for introducing both the SDL and its predecessor processes. &lt;br /&gt;
*Considerations in selling the process to management and sustaining a mandate over a prolonged period. &lt;br /&gt;
*Scaling the SDL to an organization with tens of thousands of engineers. &lt;br /&gt;
*Managing change. &lt;br /&gt;
*The role of automation in the SDL. &lt;br /&gt;
*Adaptation of the SDL to agile development processes. &lt;br /&gt;
*Thoughts for organizations that are considering implementing the SDL.&lt;br /&gt;
&lt;br /&gt;
The presentation will cover technical aspects of the SDL including a brief review of requirements and tools, and results. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio'''&amp;lt;br&amp;gt; Steven B. Lipner is senior director of Security Engineering Strategy at Microsoft Corp where he is responsible for programs that provide improved product security for Microsoft customers. Lipner leads Microsoft’s Security Development Lifecycle (SDL) team and is responsible for the definition of Microsoft’s SDL and for programs to make the SDL available to organizations beyond Microsoft. Lipner is also responsible for Microsoft’s corporate strategies related to government security evaluation of Microsoft products. &lt;br /&gt;
&lt;br /&gt;
Lipner is coauthor with Michael Howard of The Security Development Lifecycle (Microsoft Press, 2006) and is named as inventor on twelve U.S. patents and two pending applications in the field of computer and network security. He has authored numerous professional papers and conference presentations, and served on several National Research Council committees. He served two terms – a total of more than ten years – on the United States Information Security and Privacy Advisory Board and its predecessor. Lipner holds S.B. and S.M. degrees in Civil Engineering from the Massachusetts Institute of Technology and attended the Harvard Business School’s Program for Management Development. &lt;br /&gt;
&lt;br /&gt;
== DAY 2, TRACK 1  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] The Anatomy of Real-World Software Security Programs  ===&lt;br /&gt;
&lt;br /&gt;
''Pravir Chandra, Fortify'' &lt;br /&gt;
&lt;br /&gt;
Effectively reducing risk from software vulnerabilities remains a challenge for most organizations despite the existence of several secure SDLC models. From conducting technical assessments to earning management buy-in, there may not seem to be a lot of easy answers along the way, but experiences from the field shows that there is indeed hope. We've learned that the hard questions of &amp;quot;what&amp;quot;, &amp;quot;when&amp;quot;, and &amp;quot;how much&amp;quot; simply require the answers to be customized to each organization. Whether you’re a developer or a CISO, this talk will leave you with actionable advice that you can use to help take your software security assurance program to the next level.&lt;br /&gt;
 &lt;br /&gt;
To help organizations formulate their own solutions, we'll discuss several real-world examples of programs in action. From there, we’ll talk about lessons learned and introduce the ''Open Software Assurance Maturity Model'' (OpenSAMM), a flexible framework for building a balanced software security assurance program (OpenSAMM is an open and free OWASP project and more information is available at http://www.opensamm.org). Using the framework, attendees will learn how to self-assess their security activities and use available resources to drive improvement in small and measurable iterations. With time remaining, we’ll also discuss the latest work on the OpenSAMM project and how it relates to other modern approaches to building out assurance programs.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Microsoft's Security Development Lifecycle for Agile Development  ===&lt;br /&gt;
&lt;br /&gt;
''Nick Coblentz, OWASP Kansas City Chapter and AT&amp;amp;amp;T Consulting'' &lt;br /&gt;
&lt;br /&gt;
Many development and security teams believe Agile development cannot be accomplished securely.  During this presentation, Nick Coblentz will discuss the recent guidance from Microsoft that enables development teams to include secure development activities within their Agile processes without compromising features or functionality. Nick will also demonstrate ASP.NET libraries, strategies, and automated tools to reduce the effort required by developers.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Secure Application Development for the Enterprise: Practical, Real-World Tips  ===&lt;br /&gt;
&lt;br /&gt;
''Michael Craigue, Dell'' &lt;br /&gt;
&lt;br /&gt;
Dell has a reputation for IT simplification and a lean cost structure. We take the same approach with our application security program. This talk covers money-saving tips in the creation and evolution of Dell's Security Development Lifecycle, including risk assessments, security reviews, threat modeling, source code scans, awareness/training, application security user groups, security consulting staff development, and assurance scans/penetration testing. We’ll discuss how we have adapted our program to our IT, Product Group, and Services organizations. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Product Security Management in Agile Product Management  ===&lt;br /&gt;
&lt;br /&gt;
''Antti Vähä-Sipilä, Nokia'' &lt;br /&gt;
&lt;br /&gt;
This paper provides a model for product security risk management and security requirements elicitation in an agile product management framework, using the concepts of Scrum and an epics-based agile requirements model. The paper documents some real-life experiences of rolling out such a risk management model. The model addresses security threat analysis and risk acceptance, and is agnostic to the actual security engineering practices employed in the Scrum teams, and is scalable over large and small enterprises. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] OWASP Top 10 2010  ===&lt;br /&gt;
&lt;br /&gt;
''Dave Wichers, Aspect Security and OWASP Foundation'' &lt;br /&gt;
&lt;br /&gt;
This presentation will cover the OWASP Top 10 - 2010 (final version). The OWASP Top 10 was originally released in 2003 to raise awareness of the importance of application security. As the field evolves, the Top 10 needs to be periodically updated to keep with up with the times. The Top 10 was updated in 2004 and the last update was in 2007, where it introduced Cross Site Request Forgery (CSRF) as the big new emerging web application security risk. &lt;br /&gt;
&lt;br /&gt;
This update will be based on more sources of web application vulnerability information than the previous versions were when determining the new Top 10. It will also present this information in a more concise, compelling, and consumable manner, and include strong references to the many new openly available resources that can help address each issue, particularly OWASP's new Enterprise Security API (ESAPI) and Application Security Verification Standard (ASVS) projects. &lt;br /&gt;
&lt;br /&gt;
A significant change for this update will be that the OWASP Top 10 will be focused on the Top 10 Risks to Web Applications, not just the most common vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
== DAY 2, TRACK 2  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Promon TestSuite: Client-Based Penetration Testing Tool  ===&lt;br /&gt;
&lt;br /&gt;
''Folker den Braber and Tom Lysemose Hansen, Promon'' &lt;br /&gt;
&lt;br /&gt;
Vulnerability analysis has a wide scope containing both social and technical aspects. An important part of technical vulnerability analysis consists of penetration testing. In most cases, penetration testing is focused on either server side or network layer vulnerabilities. In this demonstration we will have a closer look at vulnerability analysis on the client side, while demonstrating the use of the Promon Testuite testing tool. &lt;br /&gt;
&lt;br /&gt;
Promon TestSuite is designed to use the same vectors as common malware but in a clear and visual way, with varying payloads to illustrate the security issues involved with giving injected code free access to a programs memory. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Detecting and Protecting Your Users from 100% of all Malware - How?  ===&lt;br /&gt;
&lt;br /&gt;
''Bradley Anstis and Vadim Pogulievsky, M86 Security'' &lt;br /&gt;
&lt;br /&gt;
100% Malware detection is the goal but is it really achievable?  This session looks at the traditional Malware detection technologies and how well they perform today and then compares this to some newer approaches with demonstrations of Real-time code analysis and Behavioral Analysis technologies to see what is better or worse.&lt;br /&gt;
&lt;br /&gt;
100% detection rates are the goal, but how close can we get with a single technology, or what combination of technologies can we use to get as close as possible?&lt;br /&gt;
&lt;br /&gt;
This session is all about challenging the existing accepted practices for Malware protection. We want to open the minds of the attendees, encourage them to question existing solutions and the incumbent market leading vendors. We want you to also re-evaluate their environment to see if improvements can be made.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Responsibility for the Harm and Risk of Software Security Flaws  ===&lt;br /&gt;
&lt;br /&gt;
''Cassio Goldschmidt, Symantec Corp'' &lt;br /&gt;
&lt;br /&gt;
Who is responsible for the harm and risk of security flaws? The advent of worldwide networks such as the internet made software security (or the lack of software security) become a problem of international proportions. There are no mathematical/statistical risk models available today to assess networked systems with interdependent failures. Without this tool, decision-makers are bound to overinvest in activities that don’t generate the desired return on investment or under invest on mitigations, risking dreadful consequences. Experience suggests that no party is solely responsible for the harm and risk of software security flaws but a model of partial responsibility can only emerge once the duties and motivations of all parties are examine and understood. &lt;br /&gt;
&lt;br /&gt;
State of the art practices in software development won’t guarantee products free of flaws. The infinite principles of mathematics are not properly implemented in modern computer hardware without having to truncate numbers and calculations. Many of the most common operating systems, network protocols and programming languages used today were first conceived without the basic principles of security in mind. Compromises are made to maintain compatibility of newer versions of these systems with previous versions. Evolving software inherits all flaws and risks that are present in this layered and interdependent solution. Lastly, there are no formal ways to prove software correctness using neither mathematics nor definitive authority to assert the absence of vulnerabilities. The slightest coding error can lead to a fatal flaw. Without a doubt, vulnerabilities in software applications will continue to be part of our daily lives for years to come. &lt;br /&gt;
&lt;br /&gt;
Decisions made by adopters such as whether to install a patch, upgrade a system or employed insecure configurations create externalities that have implications on the security of other systems. Proper cyber hygiene and education are vital to stop the proliferation of computer worms, viruses and botnets. Furthermore, end users, corporations and large governments directly influence software vendors’ decisions to invest on security by voting with their money every time software is purchased or pirated. &lt;br /&gt;
&lt;br /&gt;
Security researchers largely influence the overall state of software security depending on the approach taken to disclose findings. While many believe full disclosure practices helped the software industry to advance security in the past, several of the most devastating computer worms were created by borrowing from information detailed by researcher’s full disclosure. Both incentives and penalties were created for security researchers: a number of stories of vendors suing security researchers are available in the press. Some countries enacted laws banning the use and development of “hacking tools”. At the same time, companies such as iDefense promoted the creation of a market for security vulnerabilities providing rewards that are larger than a year’s worth of salary for a software practitioner in countries such as China and India. &lt;br /&gt;
&lt;br /&gt;
Effective policy and standards can serve as leverage to fix the problem either by providing incentives or penalties. Attempts such PCI created a perverse incentive that diverted decision makers’ goals to compliance instead of security. Stiff mandates and ineffective laws have been observed internationally. Given the fast pace of the industry, laws to combat software vulnerabilities may become obsolete before they are enacted. Alternatively, the government can use its own buying power to encourage adoption of good security standards. One example of this is the Federal Desktop Core Configuration (FDCC). &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Hacking by Numbers  ===&lt;br /&gt;
&lt;br /&gt;
''Tom Brennan, WhiteHat Security and OWASP Foundation'' &lt;br /&gt;
&lt;br /&gt;
There is a difference between what is possible and what is probable, something we often lose sight of in the world of information security. For example, a vulnerability represents a possible way for an attacker to exploit an asset, but remember not all vulnerabilities are created equal. Obviously we must also keep in mind that just because a vulnerability exists does not necessarily mean it will be exploited, or indicate by whom or to what extent. Clearly, many vulnerabilities are very serious leaving the door open to compromise of sensitive information, financial loss, brand damage, violation of industry regulations, and downtime. Some vulnerabilities are more difficult to exploit than others and therefore attract different attackers. Autonomous worms &amp;amp;amp; viruses may attack one type of issue, while a sentient targeted attacker may prefer another path. Better understanding of these factors enables us to make informed business decisions about website risk management and what is probable. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Application Security Scoreboard in the Sky  ===&lt;br /&gt;
&lt;br /&gt;
''Chris Eng, Veracode'' &lt;br /&gt;
&lt;br /&gt;
This presentation will discuss vulnerability metrics gathered from real-world applications. The statistics are derived from continuously updated data collected by Veracode’s cloud-based code analysis service. The anonymized data represents a total of nearly 1,600 applications submitted for analysis by large and small companies, commercial software providers, open source projects, and software outsourcers between February 2007 and January 2010. This is the first vulnerability analytics study of this magnitude that incorporates data from both static analysis and dynamic analysis. &lt;br /&gt;
&lt;br /&gt;
We will compare the relative security of applications by industry and origin, and we will examine detailed vulnerability distribution data in the context of taxonomies such as the OWASP Top Ten and the CWE/SANS Top 25 Programming Errors. &lt;br /&gt;
&lt;br /&gt;
== DAY 2, TRACK 3  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] A Taint Mode for Python via a Library  ===&lt;br /&gt;
&lt;br /&gt;
''Juan José Conti, Universidad Tecnológica Nacional, and Alejandro Russo, Chalmers University of Technology'' &lt;br /&gt;
&lt;br /&gt;
Vulnerabilities in web applications present threats to on-line systems. SQL injection and cross-site scripting attacks are among the most common threats found nowadays. These attacks are often result of improper or none input validation. To help discover such vulnerabilities, taint analyses have been developed in popular web scripting languages like Perl, Ruby, PHP, and Python. Such analysis are often implemented as an execution monitor, where the interpreter needs to be adapted to provide a taint mode. However, modifying interpreters might be a major task in its own right. In fact, it is very probably that new releases of interpreters require to be adapted to provide a taint mode. Differently from previous approaches, we show how to provide a taint analysis for Python via a library written entirely in Python, and thus avoiding modifications in the interpreter. The concepts of classes, decorators and dynamic dispatch makes our solution lightweight, easy to use, and particularly neat. With minimal or none effort, the library can be adapted to work with different Python interpreters. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] OPA: Language Support for a Sane, Safe and Secure Web  ===&lt;br /&gt;
&lt;br /&gt;
''David Rajchenbach-Teller and François-Régis Sinot, MLstate'' &lt;br /&gt;
&lt;br /&gt;
Web applications and services have critical needs in terms of safety, security and privacy: they need to remain available constantly and can at any time be the object of attacks by malicious and anonymous distant users attempting to take control, alter data or steal it, or cause unwanted behaviors. Unfortunately, recent history shows numerous cases of popular web applications falling victim to such attacks, despite careful attempts to secure them. &lt;br /&gt;
&lt;br /&gt;
In this paper, we introduce OPA (One Pot Application), a new platform designed to make web development sane, safe and secure. OPA provides an integrated methodology where the complete application is written with one simple language with consistent semantics, enforces safe use of the infrastructure through compile-time static checking and a novel programming paradigm suited to the web and encourages correct-by-construction development. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Secure the Clones: Static Enforcement of Policies for Secure Object Copying  ===&lt;br /&gt;
&lt;br /&gt;
''Thomas Jensen and David Pichardie, INRIA Rennes - Bretagne Atlantique'' &lt;br /&gt;
&lt;br /&gt;
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by both a code and an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to an internal mutable object. However, implementation of a copy method (like clone()) is entirely left to the programmer. It may not provide a sufficiently deep copy of an object and is subject to overriding by a malicious sub-class. Currently no language-based mechanism supports secure object cloning. &lt;br /&gt;
&lt;br /&gt;
This paper proposes a type-based annotation system for defining modular cloning policies for class-based object-oriented programs. It provides a static enforcement mechanism that will guarantee that all classes fulfill their copying policy, even in the presence of overriding of copy methods, and establishes the semantic correctness of the overall approach. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Safe Wrappers and Sane Policies for Self Protecting JavaScript  ===&lt;br /&gt;
&lt;br /&gt;
''Jonas Magazinius, Phu H. Phung, and David Sands, Chalmers Univ. of Technology'' &lt;br /&gt;
&lt;br /&gt;
Phung et al (ASIACCS’09) describe a method for wrapping built-in methods of JavaScript programs in order to enforce security policies. The method is appealing because it requires neither deep transformation of the code nor browser modification. Unfortunately the implementation outlined suffers from a range of vulnerabilities, and policy construction is restrictive and error prone. In this paper we address these issues to provide a systematic way to avoid the identified vulnerabilities, and make it easier for the policy writer to construct declarative policies – i.e. policies upon which attacker code has no side effects. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] On the Privacy of File Sharing Services  ===&lt;br /&gt;
&lt;br /&gt;
''Nick Nikiforakis, Francesco Gadaleta, Yves Younan, and Wouter Joosen, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
File sharing services are used daily by tens of thousands of people as a way of sharing files. Almost all such services, use a security-through-obscurity method of hiding the files of one user from others. For each uploaded file, the user is given a secret URL which supposedly cannot be guessed. The user can then share his uploaded file by sharing this URL with other users of his choice. Unfortunately though, a number of file sharing services are incorrectly implemented allowing an attacker to guess valid URLs of millions of files and thus allowing him to enumerate their file database and access all of the uploaded files. In this paper, we study some of these services and we record their incorrect implementations. We design automatic enumerators for two such services and a privacy-classifying module which characterises an uploaded file as private or public. Using this technique we gain access to thousands of private files ranging from private and company documents to personal photographs. We present a taxonomy of the private files found and ways that the users and services can protect themselves against such attacks. &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration is open  ==&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/i.aspx?4W%2cM3%2c717e8a7c-4453-47ff-addb-721306529534 Click Here To Register]''' &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accommodate transfers of registrations from one person to another, if such an adjustment becomes necessary.&lt;br /&gt;
&lt;br /&gt;
== Stay Informed ... and Tell Others  ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_eu_2010 Subscribe to the conference '''mailing list''']. This is the official information channel and you'll be sure to get any updates and practical info before the conference. &lt;br /&gt;
&lt;br /&gt;
[http://events.linkedin.com/OWASP-AppSec-Research-2010/pub/185990 Add the event to your '''LinkedIn''' profle] to tell all your business contacts that AppSec Research 2010 is the place to be. &lt;br /&gt;
&lt;br /&gt;
Then get on the '''Twitter''' stream by using the tags '''#OWASP''' and '''#AppSecEU'''.&lt;br /&gt;
&lt;br /&gt;
== Conference Fees (June 23-24)  ==&lt;br /&gt;
&lt;br /&gt;
*Regular registration: €350 &lt;br /&gt;
*OWASP individual member (not just chapter member): €300 &lt;br /&gt;
*Full-time students*: €225&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; We need some kind of proof of your full-time student status. Either ask your local OWASP chapter leader to vouch for you by email to Kate.Hartmann@owasp.org, or email Kate a scanned image of your student ID (please compress the file size&amp;amp;nbsp;:). &lt;br /&gt;
&lt;br /&gt;
== Training Fee (June 21-22)  ==&lt;br /&gt;
&lt;br /&gt;
*Training fee is €990 for two days, see Training tab above&lt;br /&gt;
&lt;br /&gt;
==== Practical Info  ====&lt;br /&gt;
&lt;br /&gt;
== Tailor-Made Visitors' Guide ==&lt;br /&gt;
&lt;br /&gt;
We have tailor-made a 15-page visitors' guide to the conference and Stockholm. With this guide you'll know how to get to and from the airport, find your way to the hotel and conference, know where good bars are, know when and how to tip etc. Check it out! [http://www.owasp.org/images/e/eb/OWASP_AppSec_Research_2010_Visitors_Guide_A4.pdf pdf]&lt;br /&gt;
&lt;br /&gt;
== Swedish Wall Plugs ==&lt;br /&gt;
&lt;br /&gt;
This is how Swedish wall plugs look like (image below). The left one is not grounded and the right one is, having small metal connectors on the sides. Be sure to bring adapters, for instance like [http://international-electrical-supplies.com/sweden-plug-adapters.html these], if your's look different.&lt;br /&gt;
&lt;br /&gt;
[[Image:Swedish_wall_plugs.jpg]]&lt;br /&gt;
&lt;br /&gt;
== Weather Forecast ==&lt;br /&gt;
&lt;br /&gt;
YR.no has good coverage of the weather in Stockholm. Checkit out [http://www.yr.no/place/Sweden/Stockholm/Stockholm/ here].&lt;br /&gt;
&lt;br /&gt;
== Travel  ==&lt;br /&gt;
&lt;br /&gt;
Stockholm's foremost international airport is Arlanda (ARN). Clean and convenient speed trains will take you between Arlanda and Stockholm Central in 20 minutes. You can also fly to Stockholm Skavsta (NYO) or Stockholm Västerås (VST) where coaches take you to Stockholm Central in 1 h 20 min. &lt;br /&gt;
&lt;br /&gt;
== Accommodation  ==&lt;br /&gt;
&lt;br /&gt;
You can choose hotel/hostel freely in Stockholm but we provided three suggestions with pre-booked rooms so many OWASPers are staying there. '''Check with sites like [http://www.hotels.com hotels.com] since they might have better prices than the hotels state themselves!''' &lt;br /&gt;
&lt;br /&gt;
[[Image:Stockholm map with hotels and public transportation.jpg]] &lt;br /&gt;
&lt;br /&gt;
Subways and buses are convenient and safe and will take you right up to the venue (station/stop &amp;quot;Universitetet&amp;quot;) from these three hotels: &lt;br /&gt;
&lt;br /&gt;
'''Best Western Time Hotel'''&amp;lt;br&amp;gt; Why? Closest to the university, direct bus or subway to the conference&amp;lt;br&amp;gt; [http://www.timehotel.se/index.aspx?languageID=5 Best Western Time Hotel]&amp;lt;br&amp;gt; Single room: 1395 SEK/€145/$195&amp;lt;br&amp;gt; Double room: 1575 SEK/€160/$220&amp;lt;br&amp;gt; (Rooms were pre-booked until May 18 under code &amp;quot;G#73641 OWASP&amp;quot;)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Scandic Continental'''&amp;lt;br&amp;gt; Why? Right at the Central Station, convenient travel to and from airport, direct subway to the conference&amp;lt;br&amp;gt; [http://www.scandichotels.com/en/Hotels/Countries/Sweden/Stockholm/Hotels/Scandic-Continental-Stockholm/ Scandic Continental]&amp;lt;br&amp;gt; Single room: 1590 SEK/€165/$220&amp;lt;br&amp;gt; Double room: 1690 SEK/€175/$235&amp;lt;br&amp;gt; (Rooms were pre-booked until early May under code &amp;quot;OWASP&amp;quot;)&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Fridhemsplan's Hostel'''&amp;lt;br&amp;gt; Why? Affordable stay in Stockholm's nicest hostel, direct bus to the conference&amp;lt;br&amp;gt; [http://fridhemsplan.se/?p=Main&amp;amp;c= Fridhemsplan's Hostel]&amp;lt;br&amp;gt; Rooms cost €35-€55 ($50-$80)&amp;lt;br&amp;gt; Book directly with them through their webpage. &lt;br /&gt;
&lt;br /&gt;
==== Social Events ====&lt;br /&gt;
&lt;br /&gt;
== Official Meet Up at &amp;quot;Mosebacke&amp;quot;, Tuesday, June 22  ==&lt;br /&gt;
Regardless whether you're one of the lucky ones who will attend training or you'll just attend the conference you are invited to join us at &amp;quot;Mosebacke&amp;quot; on the evening the 22nd. Mosebacke is one of Stockholm's older establishments and is beautifully situated in the south of Stockholm city (only 2 subway stations from Central Station). The official meet up time is 20:00 CEST. We plan on beverage only, but for those who don't mind spending a little extra money on food, you can reserve a table for early evening by calling +46 8 556 098 90 during 2 pm - 5 pm (work days) or with some luck by e-mailing to mosebacke@mosebacke.se.&lt;br /&gt;
&lt;br /&gt;
How will you recognize all the other OWASPers? Some of us will have OWASP-branded grey caps, some you met earlier, some you recognize from pictures, and if you hear any non-Swedish speaking male I guess chances are they're just like you - here for the AppSec conference :).&lt;br /&gt;
&lt;br /&gt;
'''What''': Informal gathering, beer etc.&amp;lt;br&amp;gt;&lt;br /&gt;
'''When''': 8 pm CEST&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where''': Mosebacke, Mosebacke Torg 3 [http://maps.google.se/maps?f=q&amp;amp;source=s_q&amp;amp;hl=sv&amp;amp;geocode=&amp;amp;q=Mosebacke+Etablissement,+Stockholm&amp;amp;sll=59.320492,18.074398&amp;amp;sspn=0.024831,0.077162&amp;amp;gl=se&amp;amp;ie=UTF8&amp;amp;hq=Mosebacke&amp;amp;hnear=Mosebacke,+Mosebacke+Torg+3,+116+46+Stockholm&amp;amp;ll=59.320492,18.074398&amp;amp;spn=0.024831,0.077162&amp;amp;t=h&amp;amp;z=14&amp;amp;iwloc=A Google Maps]&amp;lt;br&amp;gt;&lt;br /&gt;
'''How to get there''': Subway to &amp;quot;Slussen&amp;quot; (2 stops from &amp;quot;T-centralen&amp;quot;), best exit towards &amp;quot;Götgatan&amp;quot;. Walk upwards but take the first left to &amp;quot;Hökens gata&amp;quot;. Straight up on that one.&amp;lt;br&amp;gt;&lt;br /&gt;
'''How to get there + short sightseeing''': Walk from &amp;quot;T-centralen&amp;quot; along &amp;quot;Drottninggatan&amp;quot; towards Old Town, then towards Slussen and Götgatan. Takes about 30 minutes.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Hope to meet you there!&lt;br /&gt;
&lt;br /&gt;
== Gala Dinner at City Hall, Wednesday, June 23  ==&lt;br /&gt;
All two-day conference attendees including sponsors are welcome to the official AppSec Gala Dinner at Stockholm City Hall on Wednesday June 23rd. We start with a drink at 6:30 pm and sit down for a three course dinner with entertainment at 7 pm. Don't be late.&lt;br /&gt;
&lt;br /&gt;
'''What''': Gala dinner, three course dinner with entertainment&amp;lt;br&amp;gt;&lt;br /&gt;
'''Clothes''': Nice pants/trousers + shirt or a suit is appropriate for men. Women have so many more choices so we opt-out of any suggestions. :)&amp;lt;br&amp;gt;&lt;br /&gt;
'''When''': 6:30 pm CEST&amp;lt;br&amp;gt;&lt;br /&gt;
'''Where''': City Hall, Ragnar Östbergs plan 1 [http://maps.google.se/maps?um=1&amp;amp;ie=UTF-8&amp;amp;q=stadshuset&amp;amp;fb=1&amp;amp;gl=se&amp;amp;hq=stadshuset&amp;amp;hnear=Stockholm&amp;amp;cid=0,0,15456533754099492758&amp;amp;ei=t8wYTJ7IGd6jOJqd6aEL&amp;amp;sa=X&amp;amp;oi=local_result&amp;amp;ct=image&amp;amp;resnum=1&amp;amp;ved=0CB0QnwIwAA Google Maps]&amp;lt;br&amp;gt;&lt;br /&gt;
'''How to get there''': Walk from Central Station / &amp;quot;T-centralen&amp;quot;). Takes about 10 minutes. Or take a taxi/cab and tell the driver &amp;quot;City Hall, please&amp;quot;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Whatever you do, don't skip the gala dinner!&lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
The venue for both training and conference is Aula Magna at Stockholm University.&lt;br /&gt;
&lt;br /&gt;
'''Address''' (for instance for deliveries):&amp;lt;br&amp;gt;&lt;br /&gt;
Aula Magna&amp;lt;br&amp;gt;&lt;br /&gt;
Stockholms universitet&amp;lt;br&amp;gt;&lt;br /&gt;
Frescativägen 6&amp;lt;br&amp;gt;&lt;br /&gt;
SE-106 91 Stockholm&amp;lt;br&amp;gt;&lt;br /&gt;
Sweden&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Aula Magna.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg|250px|Microsoft - Diamond Sponsor]] [[Image:AppSec Research 2010 Google 20k sponsor.jpg|150px|Google - Dinner Party and Expo Sponsor]] [[Image:Portwise logo.png|130px|PortWise - Gold and Badge Sponsor]] [[Image:Cybercom logo.png|100px|Cybercom - Gold Sponsor]] [[Image:Fortify logo AppSec Research 2010.png|120px|Fortify - Gold Sponsor]] [[Image:Omegapoint logo.png|110px|Omegapoint - Gold Sponsor]] [[Image:Mnemonic logo.png|100px|Mnemonic - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg|100px|NIXU - Silver Sponsor]] [[Image:Hps_logo.png|140px|High Performance Systems - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor F5 logo.jpg|70px|F5 - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Imperva logo.jpg|100px|Imperva - Silver Sponsor]] [[Image:AppSec_Research_2010_sponsor_Promon_logo.jpg|100px|Promon - Silver Sponsor]] [[Image:IIS logo.png|100px|Stiftelsen för Internetinfrastruktur - Lunch Sponsor]] [[Image:MyNethouse logo.png|100px|MyNethouse - Coffee Break Sponsor]] [[Image:AppSec Research 2010 Help Net Security sponsor.jpg|100px|Help Net Security - Media Sponsor]] [[Image:TrustwaveLogo.jpg|100px|Trustwave - Notepad sponsor]]&lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
We are still welcoming sponsors for OWASP AppSec Research 2010. Take the opportunity to support this year's major appsec event in Europe! The full sponsoring program is available as pdfs: &lt;br /&gt;
&lt;br /&gt;
Sponsoring program in English:&amp;amp;nbsp;[[Image:OWASP Sponsorship AppSec Research 2010 (eng).pdf]] &lt;br /&gt;
&lt;br /&gt;
Sponsoring program in Swedish:&amp;amp;nbsp;[[Image:OWASP Sponsorship AppSec Research 2010 (swe).pdf]] &lt;br /&gt;
&lt;br /&gt;
==== Challenges  ====&lt;br /&gt;
&lt;br /&gt;
=== Countdown Challenges -- Free Tickets to Win!  ===&lt;br /&gt;
&lt;br /&gt;
There will be a challenge posted on the conference wiki page the 21st every month up until the event. The winner will get free entrance to the conference. Be sure to sign up for [https://lists.owasp.org/mailman/listinfo/appsec_eu_2010 the conference mailing list] to get a monthly reminder.&lt;br /&gt;
&lt;br /&gt;
== AppSec Research Final Challenge: Internet Treasure Hunt  ==&lt;br /&gt;
&lt;br /&gt;
It's May 21st, one month to AppSec Research 2010, and '''the last chance to win a free ticket''' to this year's number one conference in appsec.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''The Treasure Hunt in a Nutshell'''&amp;lt;br&amp;gt;&lt;br /&gt;
Your mission is to find several small AppSec Research logotypes hidden among the websites of our sponsors and hosts. Every logo found is associated with a keyword (a dictionary word) in some way. When you've found all the keywords you email them to us.&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp_appsec_research_2010_logo_by_daniel_kozlowski.jpg|40px|OWASP AppSec Research 2010 logo by Daniel Kozlowski]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Instructions'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Please don't do anything malicious during your hunt. And don't produce considerable load on the websites. You should be able to find the keywords anyway :).&lt;br /&gt;
* To check if you found all keywords you compare the md5 of all keywords concatenated in alphabetical order with this hash: 1a7b54ba9cee6cccd9890e7800b83208&lt;br /&gt;
* You can calculate the hash by doing the following in a shell: echo &amp;quot;Keywords concatenated in alphabetical order&amp;quot; | md5&lt;br /&gt;
* To ensure your hash function produces the same as our you can try: echo &amp;quot;owasp&amp;quot; | md5 ... which should result in the hash 2bdce47b1a6c527b134d4b658b033702&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''How to Win'''&amp;lt;br&amp;gt;&lt;br /&gt;
To win you email all keywords (not the hash) concatenated in alphabetical order to stefan dot pettersson at owasp dot org. Stefan will let you know if you were the first one with the correct answer!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Example:'''&amp;lt;br&amp;gt;&lt;br /&gt;
* You found three logos and the keywords were: golf, king, apple&lt;br /&gt;
* You calculate the hash by doing: echo &amp;quot;applegolfking&amp;quot; | md5&lt;br /&gt;
* If the hash matches 1a7b54ba9cee6cccd9890e7800b83208 you email applegolfking to Stefan.&lt;br /&gt;
&lt;br /&gt;
Let the best hunter win!&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Ivan_Ristic_-_Breaking_SSL_-_OWASP.pdf&amp;diff=85298</id>
		<title>File:Ivan Ristic - Breaking SSL - OWASP.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Ivan_Ristic_-_Breaking_SSL_-_OWASP.pdf&amp;diff=85298"/>
				<updated>2010-06-23T12:37:41Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden&amp;diff=83042</id>
		<title>OWASP AppSec Research 2010 - Stockholm, Sweden</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_Research_2010_-_Stockholm,_Sweden&amp;diff=83042"/>
				<updated>2010-05-05T10:17:56Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__ &lt;br /&gt;
&lt;br /&gt;
==== Welcome  ====&lt;br /&gt;
&lt;br /&gt;
== Invitation  ==&lt;br /&gt;
&lt;br /&gt;
Ladies and Gentlemen, &lt;br /&gt;
&lt;br /&gt;
In June 21-24, 2010 let's all meet in beautiful Stockholm, Sweden. The OWASP chapters in [http://www.owasp.org/index.php/Sweden Sweden], [http://www.owasp.org/index.php/Norway Norway], and [http://www.owasp.org/index.php/Denmark Denmark] hereby invite you to OWASP AppSec Research 2010. &lt;br /&gt;
&lt;br /&gt;
If you have any questions, please email the conference chair: john.wilander at owasp.org &lt;br /&gt;
&lt;br /&gt;
[[Image:Stockholm old town small.jpg]] &lt;br /&gt;
&lt;br /&gt;
=== Sponsors  ===&lt;br /&gt;
&lt;br /&gt;
Diamond sponsor:&amp;lt;br&amp;gt; [[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg]] &lt;br /&gt;
&lt;br /&gt;
Gold sponsors:&amp;lt;br&amp;gt; [[Image:Cybercom logo.png]] [[Image:Portwise logo.png]]&amp;lt;br&amp;gt; [[Image:Fortify logo AppSec Research 2010.png]] [[Image:Omegapoint logo.png]] &lt;br /&gt;
&lt;br /&gt;
Silver sponsors (3 taken, 5 open):&amp;lt;br&amp;gt; [[Image:Mnemonic logo.png]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg]] &amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.hps.se/ http://www.owasp.org/images/6/6f/Hps_logo.png]&lt;br /&gt;
&lt;br /&gt;
Dinner Party sponsor:&amp;lt;br&amp;gt; [http://www.google.com/EngineeringEMEA http://www.owasp.org/images/thumb/8/86/AppSec_Research_2010_Google_20k_sponsor.jpg/150px-AppSec_Research_2010_Google_20k_sponsor.jpg]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Lunch sponsors (1 taken, 1 open):&amp;lt;br&amp;gt; [[Image:IIS logo.png]] &lt;br /&gt;
&lt;br /&gt;
Coffee break sponsors (1 taken, 3 open):&amp;lt;br&amp;gt; [[Image:MyNethouse logo.png]] &lt;br /&gt;
&lt;br /&gt;
Media sponsors:&amp;lt;br&amp;gt; [[Image:AppSec Research 2010 Help Net Security sponsor.jpg]] &lt;br /&gt;
&lt;br /&gt;
For full sponsoring program see the Sponsoring tab above.&lt;br /&gt;
&lt;br /&gt;
=== &amp;quot;AppSec Research&amp;quot;.equals(&amp;quot;AppSec Europe&amp;quot;)  ===&lt;br /&gt;
&lt;br /&gt;
This conference was formerly known as OWASP AppSec Europe. We have added 'Research' to highlight that we invite both industry and academia. All the regular AppSec Europe visitors and topics are welcome along with contributions from universities and research institutes. &lt;br /&gt;
&lt;br /&gt;
This will be ''the'' European conference for anyone interested in or working with application security. Co-host is the [http://dsv.su.se/en/ Department of Computer and Systems Science] at Stockholm University, offering a great venue in the fabulous Aula Magna. &lt;br /&gt;
&lt;br /&gt;
=== Countdown Challenges -- Free Tickets to Win!  ===&lt;br /&gt;
&lt;br /&gt;
There will be a challenge posted on the conference wiki page the 21st every month up until the event. The winner will get free entrance to the conference. What are you waiting for? Go to the Challenges tab and have fun! &lt;br /&gt;
&lt;br /&gt;
=== Organizing Committee  ===&lt;br /&gt;
&lt;br /&gt;
• John Wilander, chapter leader Sweden (chair)&amp;lt;br&amp;gt; • Mattias Bergling (vice chair)&amp;lt;br&amp;gt; • Alan Davidson, Stockholm University/Royal Institute of Technology (co-host)&amp;lt;br&amp;gt; • Ulf Munkedal, chapter leader Denmark&amp;lt;br&amp;gt; • Kåre Presttun, chapter leader Norway&amp;lt;br&amp;gt; • Stefan Pettersson (sponsoring coordinator)&amp;lt;br&amp;gt; • Carl-Johan Bostorp (schedule and event coordinator)&amp;lt;br&amp;gt; • Martin Holst Swende (coffee/lunch/dinner)&amp;lt;br&amp;gt; • Michael Boman (conference guide/attendee pack)&amp;lt;br&amp;gt; • Predrag Mitrovic, OWASP Sweden Board&amp;lt;br&amp;gt; • Kate Hartmann, OWASP&amp;lt;br&amp;gt; • Sebastien Deleersnyder, OWASP Board &lt;br /&gt;
&lt;br /&gt;
'''Welcome to Stockholm this year!'''&amp;lt;br&amp;gt; Regards, John Wilander &lt;br /&gt;
&lt;br /&gt;
==== June 21-22 (Training)  ====&lt;br /&gt;
&lt;br /&gt;
== Training Registration is open  ==&lt;br /&gt;
&lt;br /&gt;
Application security training is given the first two days, '''June 21-22'''. The price is '''€990''' (~$1.350) for a two-day course. Take the chance to learn from the best! &lt;br /&gt;
&lt;br /&gt;
'''--&amp;amp;gt; [http://guest.cvent.com/i.aspx?4W%2cM3%2c717e8a7c-4453-47ff-addb-721306529534 Register here]''' &lt;br /&gt;
&lt;br /&gt;
=== Course 1: Threat Modeling and Architecture Review (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Pravir Chandra.jpg]] &lt;br /&gt;
&lt;br /&gt;
Pravir Chandra, Fortify Software &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Threat Modeling and Architecture Review are the cornerstones of a preventative approach to Application Security. By combining these topics into single comprehensive course attendees can get a complete understanding of how to understand the threat an application faces and how the application will handle those potential threats. This enables the risk to be accurately assessed and appropriate changes or mitigating controls recommended. From the course outline:&lt;br /&gt;
&lt;br /&gt;
1. Overview&lt;br /&gt;
* Scope and problem definition&lt;br /&gt;
* High‐level view of the overall process&lt;br /&gt;
* Core techniques&lt;br /&gt;
2. Threat assessment and modeling&lt;br /&gt;
* Overall threat modeling process&lt;br /&gt;
* Preparation and background information&lt;br /&gt;
* Capturing business and security goals&lt;br /&gt;
* Identify vulnerabilities and other risks&lt;br /&gt;
* Establish weighting and prioritization of risks&lt;br /&gt;
* Guard against risks with compensating controls&lt;br /&gt;
* EXERCISE  -  Threat model a real‐life problem&lt;br /&gt;
3. Architecture review techniques&lt;br /&gt;
* Authentication&lt;br /&gt;
* Authorization&lt;br /&gt;
* EXERCISE  - Apply the techniques from Authentication and Authorization&lt;br /&gt;
* Input validation&lt;br /&gt;
* Output encoding&lt;br /&gt;
* EXERCISE - Apply the techniques from Input Validation and Output Encoding&lt;br /&gt;
* Error handling&lt;br /&gt;
* Audit logging&lt;br /&gt;
* EXERCISE - Apply the techniques from Error Handling and Audit Logging&lt;br /&gt;
* Encryption&lt;br /&gt;
* Configuration management&lt;br /&gt;
* EXERCISE - Apply the techniques from Encryption and Configuration Management&lt;br /&gt;
4. Specifying security requirements&lt;br /&gt;
* Writing positive security requirements&lt;br /&gt;
* Deriving security requirements from functional requirements&lt;br /&gt;
* Thinking broadly about requirements coverage&lt;br /&gt;
* Balancing security requirements with functionality&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Pravir Chandra is Director of Strategic Services at Fortify where he works with clients to build and optimize software security assurance programs. Pravir is widely recognized in the industry for his expertise in software security and code analysis, and also for his ability to apply technical knowledge strategically from a business perspective. His book, Network Security with OpenSSL is a popular reference on protecting software applications through cryptography and secure communications. His varied special project experience includes creating and leading the Open Software Assurance Maturity Model (OpenSAMM) project &lt;br /&gt;
&lt;br /&gt;
'''--&amp;amp;gt; [http://guest.cvent.com/i.aspx?4W%2cM3%2c717e8a7c-4453-47ff-addb-721306529534 Register here]'''&lt;br /&gt;
&lt;br /&gt;
=== Course 2: Introduction to Malware Analysis (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Jason Geffner.jpg]] &lt;br /&gt;
&lt;br /&gt;
Jason Geffner, Next Generation Security Software (NGS), and Scott Lambert, Microsoft &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Security researchers are facing a growing problem in the complexity of malicious executables. While dynamic black-box automation tools exist to discover what malware will do on a given execution, it is often important for an analyst to know the full capabilities of a given malware sample. What port does it listen on? What password does it expect for backdoor access? What files will it write to? What will it do tomorrow that it didn't do today? This class will focus on teaching attendees the steps required to understand the functionality of given malware samples. This is a hands-on course. Attendees will work on real-world malware through a series of lab exercises designed to build their expertise in understanding the analysis process. &lt;br /&gt;
&lt;br /&gt;
Learning Objectives: &lt;br /&gt;
&lt;br /&gt;
*An understanding of how to use reverse engineering tools &lt;br /&gt;
*An understanding of low-level code and data flow &lt;br /&gt;
*PE File format &lt;br /&gt;
*x86 Assembly language &lt;br /&gt;
*API functions often used by malware &lt;br /&gt;
*Anti-analysis tricks and how to defeat them &lt;br /&gt;
*Exploits and Shellcode &lt;br /&gt;
*A methodology for analyzing malware with and without the use of specialized tools&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Jason Geffner joined Next Generation Security Software Ltd. in June of 2007 as a Principal Security Consultant. Jason focuses on performing security reviews of source code and designs, reverse engineering software protection methods and DRM protection methods, deobfuscating and analyzing malware, penetration testing web applications and network infrastructures, and developing automated security analysis tools. &lt;br /&gt;
&lt;br /&gt;
'''--&amp;amp;gt; [http://guest.cvent.com/i.aspx?4W%2cM3%2c717e8a7c-4453-47ff-addb-721306529534 Register here]''' &lt;br /&gt;
&lt;br /&gt;
=== Course 3: Building Secure Ajax and Web 2.0 Applications (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Dave Wichers.jpg]] &lt;br /&gt;
&lt;br /&gt;
Dave Wichers, Aspect Security &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Students gain hands-on testing experience with freely available web application security test tools to find and diagnose flaws and learn how to identify them in their own projects. Because finding flaws is worthless without effective communication, the course also covers the process of creating and communicating software security flaws effectively. In addition, Aspect’s engineers are leaders in the AppSec Community and will offer the students an amazing perspective. &lt;br /&gt;
&lt;br /&gt;
From the course outline:&amp;lt;br&amp;gt; CSS Attacks, Browser Add On Attacks, RSS / Data Feed Attacks, Microsoft Active X, Adobe Flash/Flex/AIR, Silverlight, Java FX, Ajax Mashups, Same Origin Policy, JavaScript, Web 2.0 CSRF Attacks, XHR JSON Forgery, Best Practice: Check HTTP Headers, Best Practice: Unique ID For XHR, JSON and XML Based XSS, How to use OWASP AntiSamy, Blended Threats, Dealing with Ajax Toolkits, Best Practice: Fuzzing ... &lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Dave Wichers is a member of the OWASP Board and a coauthor, along with Jeff Williams, of all previous versions of the OWASP Top Ten. Dave is also the Chief Operating Officer of Aspect Security, a company that specializes in application security services. Mr. Wichers brings over twenty years of experience in the information security field. Prior to cofounding Aspect, he ran the Application Security Services Group at a large data center company, Exodus Communications. His current work involves helping customers, from small e-commerce sites to Fortune 500 corporations and the U.S. Government, secure their applications by providing application security design, architecture, and SDLC support services: including code review, application penetration testing, security policy development, security consulting services, and developer training. &lt;br /&gt;
&lt;br /&gt;
'''--&amp;amp;gt; [http://guest.cvent.com/i.aspx?4W%2cM3%2c717e8a7c-4453-47ff-addb-721306529534 Register here]''' &lt;br /&gt;
&lt;br /&gt;
=== Course 4: Assessing and Exploiting Web Apps with Samurai-WTF (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Justin Searle.jpg]] &lt;br /&gt;
&lt;br /&gt;
Justin Searle, InGuardians &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': This course will focus on using open source tools to perform web application assessments. The course will take attendees through the process of application assessment using the open source tools included in the Samurai Web Testing Framework Live CD (Samurai-WTF). Day one will take students through the steps and open source tools used to assess applications for vulnerabilities. Day two will focus on the exploitation of web app vulnerabilities, spending half the day on server side attacks and the other half of the day on client side attacks. The latest tools and techniques will be use throughout the course, including several tools developed by the trainers themselves. From the course outline:&lt;br /&gt;
&lt;br /&gt;
Samurai-WTF Project and Distribution (about, using ...)&amp;lt;br&amp;gt;&lt;br /&gt;
Web Application Assessment Methodology (pentest types, four step methodology ...)&amp;lt;br&amp;gt;&lt;br /&gt;
Step 1: Reconnaissance&lt;br /&gt;
* Overview of Web Application Recon&lt;br /&gt;
* Domain and IP Registration Databases  (Labs: whois)&lt;br /&gt;
* Google Hacking  (Labs: gooscan, gpscan)&lt;br /&gt;
* Social Networks  (Labs: Reconnoiter)&lt;br /&gt;
* DNS Interrogation  (Labs: host, dig, nslookup, fierce)&lt;br /&gt;
Step 2: Mapping&lt;br /&gt;
* Overview of Mapping&lt;br /&gt;
* Port Scanning and Fingerprinting  (Labs: nmap, zenmap, Yokoso!)&lt;br /&gt;
* Web Service Scanning  (Labs: Nikto)&lt;br /&gt;
* Spidering  (Labs: wget, curl, Paros, WebScarab, BurpSuite)&lt;br /&gt;
* Discovering &amp;quot;Non-Discoverable&amp;quot; URLs  (Labs: DirBuster)&lt;br /&gt;
Step 3: Discovery&lt;br /&gt;
* Using Built-in Tools  (Labs: Page Info, Error Console, DOM Inspector, View Source)&lt;br /&gt;
* Poking and Prodding  (Labs: Default User Agent, Cookie Editor, Tamper Data)&lt;br /&gt;
* Interception Proxies  (Labs: Paros, WebScarab, BurpSuite)&lt;br /&gt;
* Semi-Automated Discovery  (Labs: RatProxy)&lt;br /&gt;
* Automated Discovery  (Labs: Grendel-Scan, w3af)&lt;br /&gt;
* Information Discovery  (Labs: CeWL)&lt;br /&gt;
* Fuzzing  (Labs: JBroFuzz, BurpIntruder)&lt;br /&gt;
* Finding XSS  (Labs: TamperData, XSS-Me, BurpIntruder)&lt;br /&gt;
* Finding SQL Injection  (Labs: SQL Inject-Me, SQL Injection, BurpIntruder)&lt;br /&gt;
* Decompiling Flash Objects  (Labs: Flare)&lt;br /&gt;
Step 4: Exploitation&lt;br /&gt;
* Username Harvesting  (Labs: python)&lt;br /&gt;
* Brute Forcing Passwords  (Labs: python)&lt;br /&gt;
* Command Injection  (Labs: w3af)&lt;br /&gt;
* Exploiting SQL Injection  (Labs: SQLMap, SQLNinja, Laudanum)&lt;br /&gt;
* Exploiting XSS  (Labs: Durzosploit)&lt;br /&gt;
* Browser Exploitation  (Labs: BeEF, BrowserRider, Yokoso!)&lt;br /&gt;
* Advanced exploitation through tool integration (MSF + sqlninga/sqlmap/BeEF)&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Justin Searle, a Senior Security Analyst with InGuardians, specializes in web application, network, and embedded penetration testing. Justin has presented at top security conferences including DEFCON, ToorCon, ShmooCon, and SANS. Justin has an MBA in International Technology and is CISSP and SANS GIAC-certified in incident handling and hacker techniques (GCIH) and intrusion analysis (GCIA). Justin is one of the founders and lead developers of Samurai-WTF. &lt;br /&gt;
&lt;br /&gt;
'''--&amp;amp;gt; [http://guest.cvent.com/i.aspx?4W%2cM3%2c717e8a7c-4453-47ff-addb-721306529534 Register here]''' &lt;br /&gt;
&lt;br /&gt;
=== Course 5: Securing Web Services (two days)  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Jason Li.jpg]] &lt;br /&gt;
&lt;br /&gt;
Jason Li, Aspect Security &lt;br /&gt;
&lt;br /&gt;
'''Abstract''': Aspect Security offers a two day course titled Securing Web Services designed to focus on the most important messages regarding the development and of secure web services. The objective for this course is to ensure that developers understand the real risks associated with Service Oriented Architectures, what standard are available to help, and how to use the standards. The course includes a combination of lecture and demonstration designed to provide detailed guidance regarding the implementation of specific security principles and functions. &lt;br /&gt;
&lt;br /&gt;
From the course outline:&lt;br /&gt;
&lt;br /&gt;
* Web Service and SOA Threat Model&lt;br /&gt;
* Data Formats: XML, JSON&lt;br /&gt;
* Protocols: SOAP, REST&lt;br /&gt;
* Overview of the Standards (WS-Security, SAML, XACML)&lt;br /&gt;
* Common Communications Vulnerabilities&lt;br /&gt;
* Using SSL for Simple Web Services&lt;br /&gt;
* XML Encryption&lt;br /&gt;
* XML Signature&lt;br /&gt;
* WS-Security&lt;br /&gt;
* How to Manage Web Service Identities&lt;br /&gt;
* Federated Identities&lt;br /&gt;
* Common Authentication Vulnerabilities&lt;br /&gt;
* WSDL Examples of Implementing WS-Security&lt;br /&gt;
* Common Access Control Vulnerabilities&lt;br /&gt;
* How to Validate Web Service Input (XML Schema, Business Logic Validation)&lt;br /&gt;
* Common XML Attacks (Recursion, References, Overflow, Transforms)&lt;br /&gt;
* State Management&lt;br /&gt;
* Using Interpreters Safely (SQL Injection, LDAP Injection, Command Injection, XPath Injection)&lt;br /&gt;
* Denial of Service and Availability&lt;br /&gt;
&lt;br /&gt;
'''Trainer Bio''': Jason Li is a Senior Application Security Engineer for Aspect Security where he performs application security assessments and architecture reviews, as well as application security training, to a wide variety of financial and government customers. Jason is an active OWASP leader, contributing to several OWASP projects and serving on the OWASP Global Projects Committee. He holds a Post-Masters certificate in Computer Science and concentration in Information Security from Johns Hopkins University and a Masters degree in Computer Science from Cornell University. &lt;br /&gt;
&lt;br /&gt;
'''--&amp;amp;gt; [http://guest.cvent.com/i.aspx?4W%2cM3%2c717e8a7c-4453-47ff-addb-721306529534 Register here]''' &lt;br /&gt;
&lt;br /&gt;
==== June 23  ====&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;width: 80%;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;4&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(64, 88, 160); color: white;&amp;quot; | '''Conference Day 1 - June 23, 2010''' &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] = Research paper [[Image:OWASP AppSec Research 2010 Demo D.gif]] = Demo [[Image:OWASP AppSec Research 2010 Presentation P.gif]] = Presentation &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | &amp;lt;br&amp;gt; &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | Track 1 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | Track 2 &lt;br /&gt;
| style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | Track 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:00-08:50 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Registration and Coffee&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 08:50-09:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Welcome to OWASP AppSec Research 2010 Conference (John Wilander &amp;amp;amp; Dave Wichers)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 09:00-10:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(252, 252, 150);&amp;quot; | [[#Keynote: Cross-Domain Theft and the Future of Browser Security]] &lt;br /&gt;
''Chris Evans, Information Security Engineer, and Ian Fette, Product Manager for Chrome Security, Google'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:10-10:45 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#BitFlip: Determine a Data's Signature Coverage from Within the Application]] &lt;br /&gt;
''Henrich Christopher Poehls, University of Passau''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#CsFire: Browser-Enforced Mitigation Against CSRF]] &lt;br /&gt;
''Lieven&amp;amp;nbsp;Desmet&amp;amp;nbsp;and&amp;amp;nbsp;Philippe&amp;amp;nbsp;De&amp;amp;nbsp;Ryck,&amp;amp;nbsp;Katholieke Universiteit Leuven''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Deconstructing ColdFusion]] &lt;br /&gt;
''Chris Eng,&amp;amp;nbsp;Veracode'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 10:45-11:10 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF kick-off, '''Coffee break sponsoring position open''' ($2,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:10-11:45 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Towards Building Secure Web Mashups]] &lt;br /&gt;
''M Decat, P De Ryck, L Desmet, F Piessens, W Joosen,&amp;amp;nbsp;Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Automated vs. Manual Security: You Can't Filter &amp;quot;The Stupid&amp;quot;]]&amp;lt;br&amp;gt; &lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave'' &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#How to Render SSL Useless]] &lt;br /&gt;
''Ivan Ristic, Qualys&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 11:55-12:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Enterprise Security Patterns for RESTful Web Services]] &lt;br /&gt;
&lt;br /&gt;
''Francois Lascelles,&amp;amp;nbsp;Layer 7 Technologies''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Web Frameworks and How They Kill Traditional Security Scanning]] &lt;br /&gt;
''Christian Hang and Lars Andren,&amp;amp;nbsp;Armorize Technologies'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#The State of SSL in the World]] &lt;br /&gt;
''Michael Boman, Omegapoint&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 12:30-13:45 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Lunch - Expo - CTF, Lunch sponsor: [[Image:OWASP AppSec Research 2010 IIS logo for program.png]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 13:45-14:20 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Securing Web Applications with ESAPI]] &lt;br /&gt;
''Ken Sipe,&amp;amp;nbsp;Perficient'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Beyond the Same-Origin Policy]] &lt;br /&gt;
''Jasvir Nagra and Mike Samuel, Google&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#SmashFileFuzzer - a New File Fuzzer Tool]] &lt;br /&gt;
''Komal Randive, Symantec'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 14:30-15:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Security Toolbox for .NET Development and Testing]] &lt;br /&gt;
''Johan Lindfors and Dag König, Microsoft'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Cross-Site Location Jacking (XSLJ) (not really)]] &lt;br /&gt;
''David Lindsay, Cigital&amp;lt;br&amp;gt;Eduardo Vela Nava,&amp;amp;nbsp;sla.ckers.org''&lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Owning Oracle: Sessions and Credentials]] &lt;br /&gt;
''Wendel G. Henrique and Steve Ocepek, Trustwave'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:05-15:30 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 80%; background: none repeat scroll 0% 0% rgb(194, 194, 194);&amp;quot; | Break - Expo - CTF, '''Coffee break sponsoring position open''' ($2,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 15:30-16:05 &lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 133, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Value Objects a la Domain-Driven Security: A Design Mindset to Avoid SQL Injection and Cross-Site Scripting]] &lt;br /&gt;
''Dan Bergh Johnsson, Omegapoint'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(188, 165, 122);&amp;quot; | [[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#New Insights into Clickjacking]] &lt;br /&gt;
''Marco Balduzzi,&amp;amp;nbsp;Eurecom&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
| align=&amp;quot;left&amp;quot; style=&amp;quot;width: 30%; background: none repeat scroll 0% 0% rgb(153, 255, 153);&amp;quot; | [[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Session Fixation - the Forgotten Vulnerability?]] &lt;br /&gt;
''Michael Schrank and Bastian Braun, University of Passau&amp;lt;br&amp;gt;Martin Johns, SAP Research'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 16:15-17:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;3&amp;quot; style=&amp;quot;width: 90%; background: none repeat scroll 0% 0% rgb(242, 242, 242);&amp;quot; | Panel Discussion: To Be Announced&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width: 10%; background: none repeat scroll 0% 0% rgb(123, 138, 189);&amp;quot; | 19:00-23:00 &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(43, 58, 109);&amp;quot; | [[Image:OWASP_AppSec_Research_2010_Stockholm_City_Hall_exterior_small.jpg|Stockholm City Hall, photo by Yanan Li]]&lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(43, 58, 109); color: white;&amp;quot; | '''Gala Dinner''' at [http://international.stockholm.se/Tourism-and-history/The-Famous-City-Hall/Pictures-of-the-City-Hall/ &amp;lt;span style=&amp;quot;color:rgb(163, 178, 229);&amp;quot;&amp;gt;Stockholm City Hall&amp;lt;span&amp;gt;]&amp;lt;br&amp;gt;Sponsored by&amp;lt;br&amp;gt;[[Image:OWASP AppSec Research 2010 Google logo for program.png]] &lt;br /&gt;
| align=&amp;quot;center&amp;quot; colspan=&amp;quot;1&amp;quot; style=&amp;quot;background: none repeat scroll 0% 0% rgb(43, 58, 109);&amp;quot; | [[Image:OWASP_AppSec_Research_2010_Stockholm_City_Hall_Golden_Hall_small.jpg|The Golden Hall, photo by Yanan Li]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg|250px|Microsoft - Diamond Sponsor]] [[Image:AppSec Research 2010 Google 20k sponsor.jpg|150px|Google - Dinner Party and Expo Sponsor]] [[Image:Portwise logo.png|130px|PortWise - Gold and Badge Sponsor]] [[Image:Cybercom logo.png|100px|Cybercom - Gold Sponsor]] [[Image:Fortify logo AppSec Research 2010.png|120px|Fortify - Gold Sponsor]] [[Image:Omegapoint logo.png|110px|Omegapoint - Gold Sponsor]] [[Image:Mnemonic logo.png|100px|Mnemonic - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg|100px|NIXU - Silver Sponsor]] [[Image:Hps_logo.png|120px|High Performance Systems - Silver Sponsor]] [[Image:IIS logo.png|100px|Stiftelsen för Internetinfrastruktur - Lunch Sponsor]] [[Image:MyNethouse logo.png|100px|MyNethouse - Coffee Break Sponsor]] [[Image:AppSec Research 2010 Help Net Security sponsor.jpg|100px|Help Net Security - Media Sponsor]] &lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Keynote: Cross-Domain Theft and the Future of Browser Security  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec research 2010 invited talk 1.jpg]] &lt;br /&gt;
&lt;br /&gt;
'''Chris Evans'''&amp;lt;br&amp;gt; Troublemaker, Information Security Engineer, and Tech Lead at Google inc.&amp;lt;br&amp;gt; Also the sole author of vsftpd. &lt;br /&gt;
&lt;br /&gt;
'''Ian Fette'''&amp;lt;br&amp;gt; Product Manager for Chrome Security and Google's Anti-Malware initiative &lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&amp;lt;br&amp;gt; The web browser, and associated machinery, is on the front line of attacks. We will first look at design-level problems with the traditional browser in terms of monolithic architecture and fundamental problems with the same-origin policy. We will then look at the types of solution that are starting to appear in browsers such as Google Chrome and Internet Explorer. We will look at other important browser-based defenses such as Safe Browsing. We will detail what a future browser might look like that has a much more secure design, but is still usable on the wide variety of web sites that people use daily. &lt;br /&gt;
&lt;br /&gt;
== DAY 1, TRACK 1  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] BitFlip: Determine a Data's Signature Coverage from Within the Application  ===&lt;br /&gt;
&lt;br /&gt;
''Henrich Christopher Poehls, University of Passau - ISL'' &lt;br /&gt;
&lt;br /&gt;
Despite applied cryptographic primitives applications are working on data that was not protected by them. We show by abstracting the message flow between the application and the underlying wire, that protection is applied to a different data model. Taking problems from real life, like XML wrapping attacks and digital signatures on XML, we show that establishing the right linkage between the security checked on lower levels and the application above is practically difficult. We propose a application controlled check, the BitFlip-test. By this simple test an application can test if the application's assumed protection of a data value was indeed provided by the digital signature applied to the message that contained the value. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Towards Building Secure Web Mashups  ===&lt;br /&gt;
&lt;br /&gt;
''Maarten Decat, Philippe De Ryck, Lieven Desmet, Frank Piessens, and Wouter Joosen, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
Web mashups combine components from multiple sources into a single, interactive application. This kind of setup typically requires both interaction between the components to achieve the necessary functionality, as well as component separation to achieve a secure execution. Unfortunately, the traditional web is not designed to easily fulfill both requirements, which can be seen in the restrictions imposed by traditional development techniques. This paper gives an overview of these traditional techniques and investigates new developments, specifically aimed at combining components in a secure manner. In addition, topics for further improvement are identified to ensure a wide adaptation of secure mashups. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Enterprise Security Patterns for RESTful Web Services  ===&lt;br /&gt;
&lt;br /&gt;
''Francois Lascelles, Layer 7 Technologies'' &lt;br /&gt;
&lt;br /&gt;
This presentation discusses security mechanisms for RESTful Web services in cloud and enterprise deployments. Understand the relationship between REST principles and security for RESTful Web service. Learn about current practices involving SSL, HMAC authentication schemes, OAuth, SAML, and perimeter security patterns involving specialized infrastructure. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Securing Web Applications with ESAPI  ===&lt;br /&gt;
&lt;br /&gt;
''Ken Sipe, Perficient'' &lt;br /&gt;
&lt;br /&gt;
When it comes to cross cutting software concerns, we expect to have or build a common framework or utility to solve this problem. This concept is represented well in the Java world with the loj4j framework, which abstracts the concern of logging, where it logs and the management of logging. The one cross cutting software concern which seems for most applications to be piecemeal is that of security. Security concerns include certification generation, SSL, protection from SQL Injection, protection from XSS, user authorization and authentication. Each of these separate concerns tend to have there own standards and libraries and leaves it as an exercise for the development team to cobble together a solution which includes multiple needs.... until now... Enterprise Security API library from OWASP. &lt;br /&gt;
&lt;br /&gt;
This session will look at a number of security concerns and how the ESAPI library provides a unified solution for security. This includes authorization, authentication of services, encoding, encrypting, and validation. This session will discuss a number of issues which can be solved through standardizing on the open source Enterprise Security API. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Security Toolbox for .NET Development and Testing  ===&lt;br /&gt;
&lt;br /&gt;
''Johan Lindfors and Dag König, Microsoft'' &lt;br /&gt;
&lt;br /&gt;
Being a developer on the Microsoft platform leveraging .NET doesn’t only involve keeping up with the continuous development of the underlying framework and technologies. It also means to be on top of the latest security threats and naturally the available mitigations and best practices to protect the customers and users of the applications and solutions being developed. &lt;br /&gt;
&lt;br /&gt;
In this session we will demonstrate how you as a .NET developer can leverage existing tools and technologies to build safer applications. During the demonstrations you will get more familiar with the existing tools within Visual Studio but also be introduced and educated in more tools that will help you build a toolbox for secure development and security testing. &lt;br /&gt;
&lt;br /&gt;
But one must also remember that tools will never replace knowledge and hence we will also show you how you can regularly get updated with the latest information from Microsoft on security including how to leverage SDL – Security Development Lifecycle, within your own projects. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Value Objects a la Domain-Driven Security: A Design Mindset to Avoid SQL Injection and Cross-Site Scripting  ===&lt;br /&gt;
&lt;br /&gt;
''Dan Bergh Johnsson, Omegapoint'' &lt;br /&gt;
&lt;br /&gt;
SQL Injection and Cross-Site Scripting have been topping the OWASP Top Ten for the last years. It must be a top priority for the community to evolve designs and mindsets that help the programmers to avoid these traps in their day-to-day work, where they have so much else but security that calls for their attention. The ambition of this presentation is to show design and coding practices that are well established in other fields of software development and put them to use to avoid just-mentioned traps. We also show some small refactorings that can be immediately applied to an existing codebase to make significant improvements to its security. Attendants of the session should be able to go back to work Monday morning and finish an improvement in this style before Monday lunch. &lt;br /&gt;
&lt;br /&gt;
We take inspiration from Domain Driven Design (DDD), which is characterized by its focus on what the software intend to represent. In particular, we make heavy use of the Value Object design pattern, where strict typing help us enforce that the incoming data is truthful to the restrictions of the domain. We start out with Injection Flaws and use the canonical username SQL Injection attack (“’OR 1=1 --“) as an example. Realizing that mentioned string was not intended as a valid username we elaborate the model to reflect this. Further more we make this change explicit in the code by introducing the new type and class Username. This also gives a natural place to put validation code, which otherwise often is placed in utility classes where it is easily forgotten and seldom called. In fact, we can even design service methods to require a validated Username, thus using the strong typing to enforce validation in the calling client system tier. &lt;br /&gt;
&lt;br /&gt;
Making this re-design with associated code changes is performed as a demo, and en route we discuss other design options and their relative merits and drawbacks. Again using DDD we proceed to analyse XSS. In the same way we see that XSS is in the general case not an indata validation problem. An extended analysis proposes that it can be phrased as an output-encoding problem. Using a similar technique we model the target domain of web content as the new type HTMLString, and can thereby enforce conversion from ordinary strings to strings with the proper encoding. If you have multiple content channels, then each channel will. &lt;br /&gt;
&lt;br /&gt;
All steps needed are shown in code, starting with a vulnerable application and through controlled refactoring steps ending up with a version without the vulnerability. In summary, we will take an established quality practice from another field of software development and use it to get security improvements. The main benefits are two: firstly, the method gently guides and reminds the programmers to include validation and encoding in an unobtrusive way. Secondly, the work can be performed in very small steps, where the first can be finished before lunch Monday after the conference. &lt;br /&gt;
&lt;br /&gt;
== DAY 1, TRACK 2  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] CsFire: Browser-Enforced Mitigation Against CSRF  ===&lt;br /&gt;
&lt;br /&gt;
''Lieven Desmet and Philippe De Ryck, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
Cross-Site Request Forgery (CSRF) is a web application attack vector that can be leveraged by an attacker to force an unwitting user's browser to perform actions on a third party website, possibly reusing all cached authentication credentials of that user. &lt;br /&gt;
&lt;br /&gt;
Currently, a whole range of techniques exist to mitigate CSRF, either by protecting the server application or by protecting the end-user. Unfortunately, the server-side protection mechanisms are not yet widely adopted, and the client-side solutions provide only limited protection or cannot deal with complex web 2.0 applications, which use techniques such as AJAX, mashups or single sign-on (SSO). &lt;br /&gt;
&lt;br /&gt;
In this talk, we will presents three interesting results of our research: (1) an extensive, real‐world traffic analysis to gain more insights in cross‐domain web interactions, (2) requirements for client‐side mitigation against CSRF and an analysis of existing browser extensions and (3) CsFire, our newly developed FireFox extension to mitigate CSRF. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Automated vs. Manual Security: You Can't Filter &amp;quot;The Stupid&amp;quot;  ===&lt;br /&gt;
&lt;br /&gt;
''David Byrne and Charles Henderson, Trustwave'' &lt;br /&gt;
&lt;br /&gt;
Everyone wants to stretch their security budget, and automated application security tools are an appealing choice for doing so. However, manual security testing isn’t going anywhere until the HAL application scanner comes online. This presentation will use often humorous, real-world examples to illustrate the relative strengths and weaknesses of automated solutions and manual techniques. &lt;br /&gt;
&lt;br /&gt;
Automated tools certainly have some strengths (namely low incremental cost, detecting simple vulnerabilities, and performing highly repetitive tasks). In addition to preventing some attacks, WAFs also have advantages for some compliance frameworks. However, automated solutions are far from perfect. To begin with, there are entire classes of very important vulnerabilities that are theoretically impossible for automated software to detect (at least until HAL comes online). Examples include complex information leakage, race conditions, logic flaws, design flaws, subjective vulnerabilities such as CSRF, and multistage process attacks. &lt;br /&gt;
&lt;br /&gt;
Beyond that, there are many vulnerabilities that are too complicated or obscure to practically detect with an automated tool. Automated tools are designed to cover common application designs and platforms. Applications using an unusual layout or components will not be thoroughly protected by automated tools. Realistically, only the most vanilla of web applications written on common, simple platforms will receive solid code coverage from an automated tool. &lt;br /&gt;
&lt;br /&gt;
On the other hand, manual testing is far more versatile. An experienced penetration tester can identify complicated vulnerabilities in the same way that an attacker does. Specific, real-world examples of vulnerabilities only recognizable by humans will be provided. The diversity of vulnerabilities shown will clearly demonstrate that all applications have the potential for significant vulnerabilities not detectable by automated tools. &lt;br /&gt;
&lt;br /&gt;
Manual source code reviews present even more benefits by identifying vulnerabilities that require access to source code. Examples include “hidden” or unused application components, SQL injection with no evidence in the response, exotic injection attacks (e.g. mainframe session attacks), vulnerabilities in back-end systems, and intentional backdoors. Many organizations assume that this type of vulnerability is not a large threat, but source code can be obtained by disgruntled developers, by internal attackers when the repository isn’t properly secured, by exploiting platform bugs or path directory traversal attacks, and by external attackers using a Trojan horse or similar technique. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Web Frameworks and How They Kill Traditional Security Scanning  ===&lt;br /&gt;
&lt;br /&gt;
''Christian Hang and Lars Andren, Armorize Technologies'' &lt;br /&gt;
&lt;br /&gt;
Modern web application frameworks present a challenge to static analysis technologies due to how they influence application behavior in ways not obvious from the source code. This prevents efficient security scanning and can cause up to 80% of total potential issues to remain undetected due to the incorrect framework handling. After explaining the underlying problems, we demonstrate in a real world walk through using code analysis to scan actual application code. By extending static analysis with new framework specific components, even applications using complex frameworks like Struts and Smarty can be inspected automatically and code coverage of security analysis can be greatly enhanced. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Beyond the Same-Origin Policy  ===&lt;br /&gt;
&lt;br /&gt;
''Jasvir Nagra and Mike Samuel, Google Inc'' &lt;br /&gt;
&lt;br /&gt;
The same-origin policy has governed interaction between client-side code and user data since Netscape 2.0, but new development techniques are rendering it obsolete. Traditionally, a website consisted of server-side code written by trusted, in-house developers&amp;amp;nbsp;; and a minimum of client-side code written by the same in-house devs. The same-origin policy worked because it didn't matter whether code ran server-side or client-side&amp;amp;nbsp;; the user was interacting with code produced by the same organization. But today, complex applications are being written almost entirely in client-side code requiring developers to specialize and share code across organizational boundaries. &lt;br /&gt;
&lt;br /&gt;
This talk will explain how the same-origin policy is breaking down, give examples of attacks, discuss the properties that any alternative must have, introduce a number of alternative models being examined by the Secure EcmaScript committee and other standards bodies, demonstrate how they do or don't thwart these attacks, and discuss how secure interactive documents could open up new markets for web developers. We assume a basic familiarity with web application protocols&amp;amp;nbsp;: HTTP, HTML, JavaScript, CSS&amp;amp;nbsp;; and common classes of attacks&amp;amp;nbsp;: XSS, XSRF, Phishing. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Cross-Site Location Jacking (XSLJ) (not really)  ===&lt;br /&gt;
&lt;br /&gt;
''David Lindsay, Cigital Inc, and Eduardo Vela Nava sla.ckers.org'' &lt;br /&gt;
&lt;br /&gt;
Redirects are commonly used on many websites and are an integral part of many web frameworks. However, subtle and not so subtle issues can lead to security holes and privacy issues. In this presentation, we will discuss several high and low level issues related to redirects and demonstrate how the issues can be exploited. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] New Insights into Clickjacking  ===&lt;br /&gt;
&lt;br /&gt;
''Marco Balduzzi, Eurecom'' &lt;br /&gt;
&lt;br /&gt;
Over the past year, clickjacking received extensive media coverage. News portals and security forums have been overloaded by posts claiming clickjacking to be the upcoming security threat. In a clickjacking attack, a malicious page is constructed (or a benign page is hijacked) to trick the user into performing unintended clicks that are advantageous for the attacker, such as propagating a web worm, stealing confidential information or abusing of the user session. In this talk, we formally define the problem and introduce our novel solution for automated detection of clickjacking attacks. We present the details of the system architecture and its implementation, and we evaluate the results we obtained from the analysis of over a million unique Internet pages. We conclude by discussing the clickjacking phenomenon and its future implications. &lt;br /&gt;
&lt;br /&gt;
== DAY 1, TRACK 3  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Deconstructing ColdFusion  ===&lt;br /&gt;
&lt;br /&gt;
''Chris Eng, Veracode'' &lt;br /&gt;
&lt;br /&gt;
This presentation is a technical survey of ColdFusion security, which will be of interest mostly to code auditors and penetration testers. We’ll cover the basics of ColdFusion markup, control flow, functions, and components and demonstrate how to identify common web application vulnerabilities at the source code level. We’ll also delve into ColdFusion J2EE internals, describing some of the unexpected properties we’ve observed while decompiling ColdFusion applications for static analysis. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] How to Render SSL Useless  ===&lt;br /&gt;
&lt;br /&gt;
''Ivan Ristic, Feisty Duck'' &lt;br /&gt;
&lt;br /&gt;
SSL is the technology that secures the Internet, but it is effective only when deployed properly. While the SSL protocol itself is very robust and easy to use, the same cannot be said for the usability of the complete ecosystem, which includes server configuration, certificates and application implementation details. In fact, SSL deployment is generally plagued with traps at every step of the way. As a result, too many web sites use insecure deployment practices that render SSL completely useless. In this talk I will present a list of top ten (or thereabout) deployment mistakes, based on my work on the SSL Labs assessment platform (https://www.ssllabs.com). &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] The State of SSL in the World  ===&lt;br /&gt;
&lt;br /&gt;
''Michael Boman, Omegapoint'' &lt;br /&gt;
&lt;br /&gt;
What is the status of SSL deployments in Fortune 500 companies and the top 10'000 websites (according to Alexa)? While developing a tool that was needed to perform the test-case OWASP-CM-001 (Testing for SSL-TLS) it was noticed that some sites had very good SSL-configuration, sometimes unexpectedly, and some sites has very poor security configuration, even when you could expect the site to have good security standard. Does the organization behind the site has any bearing on how good the security standard the site has in regards to HTTPS-support and configuration? The talk will highlight the findings and the tools and process of obtaining the underlying data, while also trying to answer the questions: - How many of the Fortune 500 and Top 10'000 websites offer an HTTPS-enabled browser experience to their visitors? - How is the HTTPS-server configured in regards to SSL-protocols offered, key exchange and key lengths (bit-size)? - Are there any correlation between company size, industry or popularity and the HTTPS-enabled browsing experience and the HTTPS-configuration? &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] SmashFileFuzzer - a New File Fuzzer Tool  ===&lt;br /&gt;
&lt;br /&gt;
''Komal Randive, Symantec'' &lt;br /&gt;
&lt;br /&gt;
Here is a tool SmashFileFuzzer designed and developed to address the same problem with ease. SmashFileFuzzer understands the file formats and then user can specify the fields in the file to be fuzzed. SmashFileFuzzer acts on a sample file of the required format and generates multiple fuzzed file copies from this sample file. SmashFileFuzzer also has the support to add more custom file formats to be able to fuzz them, especially .dat formats. In comparison with the existing file fuzzers and frameworks this fuzzer has simple language for adding new formats, many more modes of fuzzing and attack oriented fuzzing. Following are the highlights of this fuzzer &lt;br /&gt;
&lt;br /&gt;
*Support to understand the file formats and fuzz specific fields with specified/random data &lt;br /&gt;
*Understands the correlation between different fields and manipulates them in accordance with the fuzzed content. &lt;br /&gt;
*Can generate valid fuzzed files even based on the partial format understanding. Only the portions of file format which are understood by the user can be used to generate valid fuzzed files. &lt;br /&gt;
*Understands the custom formats for file types and also for the configuration files(e.g key value pair format or .dat formats) &lt;br /&gt;
*Tool is designed to be easily extended for any new file formats &lt;br /&gt;
*Fuzz strings are read from a dictionary file. Users can add application specific input string to this dictionary for testing. &lt;br /&gt;
*It’s a unix shell based tool which can be easily scripted.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Owning Oracle: Sessions and Credentials  ===&lt;br /&gt;
&lt;br /&gt;
''Wendel G. Henrique and Steve Ocepek, Trustwave'' &lt;br /&gt;
&lt;br /&gt;
In a world of free, ever-present encryption libraries, many penetration testers still find a lot of great stuff on the wire. Database traffic is a common favorite, and with good reason: when the data includes PAN, Track, and CVV, it makes you stop and wonder why this stuff isn’t encrypted across the board. However, despite this weakness, we still need someone to issue queries before we see the data. Or maybe not… after all, it’s just plaintext. &lt;br /&gt;
&lt;br /&gt;
Wendel G. Henrique and Steve Ocepek of Trustwave’s SpiderLabs division offer a closer look at the world’s most popular relational database: Oracle. Through a combination of downgrade attacks and session take-over exploits, this talk introduces a unique approach to database account hijacking. Using a new tool, thicknet, the team will demonstrate how deadly injection and downgrade attacks can be to database security. &lt;br /&gt;
&lt;br /&gt;
The Oracle TNS/Net8 protocol was studied extensively during presentation for this talk. Very little public knowledge of this protocol exists today, and much of the data gained is, as far as we know, new to Oracle outsiders. &lt;br /&gt;
&lt;br /&gt;
Also, during the presentation we will be offering to attendants: &lt;br /&gt;
&lt;br /&gt;
*Knowledge about man-in-the-middle and downgrade attacks, especially the area of data injection. &lt;br /&gt;
*A better understanding of the network protocol used by Oracle. &lt;br /&gt;
*The ability to audit databases against this type of attack vector. &lt;br /&gt;
*Ideas for how to prevent this type of attack, and an understanding of the value of encryption and digital signature technologies. &lt;br /&gt;
*Understanding of methodologies used to reverse-engineer undocumented protocols.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Session Fixation - the Forgotten Vulnerability?  ===&lt;br /&gt;
&lt;br /&gt;
''Michael Schrank and Bastian Braun, University of Passau, and Martin Johns, SAP Research'' &lt;br /&gt;
&lt;br /&gt;
The term 'Session Fixation vulnerability' subsumes issues in Web applications that under certain circumstances enable the adversary to perform a session hijacking attack through ontrolling the victim's session identier value. We explore this vulnerability pattern. First, we give an analysis of the root causes and document existing attack vectors. Then we take steps to assess the current attack surface of Session Fixation. Finally, we present a transparent server-side method for mitigating vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
==== June 24  ====&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | '''Conference Day 2 - June 24, 2010''' &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] = Research paper [[Image:OWASP AppSec Research 2010 Demo D.gif]] = Demo [[Image:OWASP AppSec Research 2010 Presentation P.gif]] = Presentation &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-10:00 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:rgb(252, 252, 150)&amp;quot; align=&amp;quot;center&amp;quot; | [[#Keynote: The Security Development Lifecycle - The Creation and Evolution of a Security Development Process]]&amp;lt;br&amp;gt;''Steve Lipner, Senior Director of Security Engineering Strategy, Microsoft Corporation''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:10-10:45 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Building Security In Maturity Model: A Review of Successful Software Security Programs in Europe]] &lt;br /&gt;
&lt;br /&gt;
''Gabriele Giuseppini, Cigital'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Demo D.gif]] [[#Promon TestSuite: Client-Based Penetration Testing Tool]] &lt;br /&gt;
&lt;br /&gt;
''Folker den Braber and Tom Lysemose Hansen, Promon'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#A Taint Mode for Python via a Library]] &lt;br /&gt;
&lt;br /&gt;
''Juan José Conti, Universidad Tecnológica Nacional&amp;lt;br&amp;gt;Alejandro Russo, Chalmers Univ. of Technology'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:45-11:10 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:90%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF, Coffee sponsor: [[Image:OWASP AppSec Research 2010 MyNethouse logo for program.png]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:10-11:45 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Microsoft's Security Development Lifecycle for Agile Development]] &lt;br /&gt;
&lt;br /&gt;
''Nick Coblentz, OWASP Kansas City Chapter and AT&amp;amp;T Consulting'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Detecting and Protecting Your Users from 100% of all Malware - How?]] &lt;br /&gt;
&lt;br /&gt;
''Bradley Anstis and Ellynora Nicoll, M86 Security'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#OPA: Language Support for a Sane, Safe and Secure Web]] &lt;br /&gt;
&lt;br /&gt;
''David Rajchenbach-Teller and François-Régis Sinot, MLstate'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:55-12:30 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Secure Application Development for the Enterprise: Practical, Real-World Tips]] &lt;br /&gt;
&lt;br /&gt;
''Michael Craigue, Dell'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Responsibility for the Harm and Risk of Software Security Flaws]] &lt;br /&gt;
&lt;br /&gt;
''Cassio Goldschmidt, Symantec'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Secure the Clones: Static Enforcement of Policies for Secure Object Copying]] &lt;br /&gt;
&lt;br /&gt;
''Thomas Jensen and David Pichardie, INRIA Rennes - Bretagne Atlantique'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:30-13:45 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Lunch - Expo - CTF, '''Lunch break sponsoring position open''' ($4,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:45-14:20 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Product Security Management in Agile Product Management]] &lt;br /&gt;
&lt;br /&gt;
''Antti Vähä-Sipilä, Nokia'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Hacking by Numbers]] &lt;br /&gt;
&lt;br /&gt;
''Tom Brennan, WhiteHat Security and OWASP Foundation&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#Safe Wrappers and Sane Policies for Self Protecting JavaScript]] &lt;br /&gt;
&lt;br /&gt;
''Jonas Magazinius, Phu H. Phung, and David Sands, Chalmers Univ. of Technology'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:30-15:05 &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#OWASP_Top_10_2010]] &lt;br /&gt;
&lt;br /&gt;
''Dave Wichers, Aspect Security and OWASP Foundation&amp;lt;br&amp;gt;'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Presentation P.gif]] [[#Application Security Scoreboard in the Sky]] &lt;br /&gt;
&lt;br /&gt;
''Chris Eng, Veracode'' &lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | &lt;br /&gt;
[[Image:OWASP AppSec Research 2010 Research R.gif]] [[#On the Privacy of File Sharing Services]] &lt;br /&gt;
&lt;br /&gt;
''N Nikiforakis, F Gadaleta, Y Younan, and W Joosen, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:05-15:30 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;left&amp;quot; | Break - Expo - CTF, '''Coffee break sponsoring position open''' ($2,000)&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:30-16:00 &lt;br /&gt;
| colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:90%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | CTF Price Ceremony, Announcement of OWASP AppSec EU 2011, Closing Notes&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg|250px|Microsoft - Diamond Sponsor]] [[Image:AppSec Research 2010 Google 20k sponsor.jpg|150px|Google - Dinner Party and Expo Sponsor]] [[Image:Portwise logo.png|130px|PortWise - Gold and Badge Sponsor]] [[Image:Cybercom logo.png|100px|Cybercom - Gold Sponsor]] [[Image:Fortify logo AppSec Research 2010.png|120px|Fortify - Gold Sponsor]] [[Image:Omegapoint logo.png|110px|Omegapoint - Gold Sponsor]] [[Image:Mnemonic logo.png|100px|Mnemonic - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg|100px|NIXU - Silver Sponsor]] [[Image:Hps_logo.png|120px|High Performance Systems - Silver Sponsor]] [[Image:IIS logo.png|100px|Stiftelsen för Internetinfrastruktur - Lunch Sponsor]] [[Image:MyNethouse logo.png|100px|MyNethouse - Coffee Break Sponsor]] [[Image:AppSec Research 2010 Help Net Security sponsor.jpg|100px|Help Net Security - Media Sponsor]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
== Keynote: The Security Development Lifecycle - The Creation and Evolution of a Security Development Process  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec research 2010 invited talk 2.jpg]] &lt;br /&gt;
&lt;br /&gt;
'''Steve Lipner'''&amp;lt;br&amp;gt; Senior Director of Security Engineering Strategy, Trustworthy Computing Security, Microsoft Corporation.&amp;lt;br&amp;gt; Co-author of &amp;quot;The Security Development Lifecycle&amp;quot;, Microsoft Press (book cover above). &lt;br /&gt;
&lt;br /&gt;
'''Abstract'''&amp;lt;br&amp;gt; This keynote will review the evolution of the Security Development Lifecycle (SDL) from its origins in the Microsoft “security pushes” of 2002-3 through its current status and application in 2010. It will emphasize the aspects of change and change management as the SDL and its user community have matured and grown and will conclude with a summary of some recent changes and additions to the SDL. Specific topics to be addressed include: &lt;br /&gt;
&lt;br /&gt;
*Motivations for introducing both the SDL and its predecessor processes. &lt;br /&gt;
*Considerations in selling the process to management and sustaining a mandate over a prolonged period. &lt;br /&gt;
*Scaling the SDL to an organization with tens of thousands of engineers. &lt;br /&gt;
*Managing change. &lt;br /&gt;
*The role of automation in the SDL. &lt;br /&gt;
*Adaptation of the SDL to agile development processes. &lt;br /&gt;
*Thoughts for organizations that are considering implementing the SDL.&lt;br /&gt;
&lt;br /&gt;
The presentation will cover technical aspects of the SDL including a brief review of requirements and tools, and results. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Bio'''&amp;lt;br&amp;gt; Steven B. Lipner is senior director of Security Engineering Strategy at Microsoft Corp where he is responsible for programs that provide improved product security for Microsoft customers. Lipner leads Microsoft’s Security Development Lifecycle (SDL) team and is responsible for the definition of Microsoft’s SDL and for programs to make the SDL available to organizations beyond Microsoft. Lipner is also responsible for Microsoft’s corporate strategies related to government security evaluation of Microsoft products. &lt;br /&gt;
&lt;br /&gt;
Lipner is coauthor with Michael Howard of The Security Development Lifecycle (Microsoft Press, 2006) and is named as inventor on twelve U.S. patents and two pending applications in the field of computer and network security. He has authored numerous professional papers and conference presentations, and served on several National Research Council committees. He served two terms – a total of more than ten years – on the United States Information Security and Privacy Advisory Board and its predecessor. Lipner holds S.B. and S.M. degrees in Civil Engineering from the Massachusetts Institute of Technology and attended the Harvard Business School’s Program for Management Development. &lt;br /&gt;
&lt;br /&gt;
== DAY 2, TRACK 1  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Building Security In Maturity Model: A Review of Successful Software Security Programs in Europe  ===&lt;br /&gt;
&lt;br /&gt;
''Gabriele Giuseppini, Cigital'' &lt;br /&gt;
&lt;br /&gt;
Most large organizations have practiced software security through many activities involving people, process and automation, but we are just now reaching the point where enough experience has been accumulated to compare notes and talk about what works at a macro level. In 2008, Gary McGraw, Brian Chess, and Sammy Migues interviewed the executives running nine software security initiatives at companies such as Adobe, The Depository Trust and Clearing Corporation (DTCC), EMC, Google, Microsoft, QUALCOMM, and Wells Fargo. The resulting data, drawn from real programs at different levels of maturity, was used to guide the construction of the Building Security In Maturity Model (BSIMM). &lt;br /&gt;
&lt;br /&gt;
BSIMM is a framework, a tool, and a measuring stick that can be used by organizations to gauge their software security initiatives and to highlight areas of discussion and intervention. Using BSIMM it is possible to compare initiatives with each other and unveil activities that might have been underdeveloped or that might have been adopted without sufficient foundation to achieve tangible results. &lt;br /&gt;
&lt;br /&gt;
In the past year BSIMM has expanded to collect data from dozens of additional companies, and enough data has been assembled to compare security initiatives in the United States to initiatives in the European Union. The BSIMM framework and the real-world information gathered through the interviews makes it possible to identify the set of activities that seem to be common to successful programs as well as highlight the differences and common points observed between the two regions. &lt;br /&gt;
&lt;br /&gt;
I will describe this observation-based maturity model, drawing examples from several real software security programs in the United States and in Europe. I will discuss the different ways that BSIMM can be used to organize, manage, and measure software security initiatives, and I will point out the interesting results that have been obtained from the analysis of the raw data and from the comparison of the data between the US and European regions. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Microsoft's Security Development Lifecycle for Agile Development  ===&lt;br /&gt;
&lt;br /&gt;
''Nick Coblentz, OWASP Kansas City Chapter and AT&amp;amp;amp;T Consulting'' &lt;br /&gt;
&lt;br /&gt;
Many development and security teams believe Agile development cannot be accomplished securely.  During this presentation, Nick Coblentz will discuss the recent guidance from Microsoft that enables development teams to include secure development activities within their Agile processes without compromising features or functionality. Nick will also demonstrate ASP.NET libraries, strategies, and automated tools to reduce the effort required by developers.&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Secure Application Development for the Enterprise: Practical, Real-World Tips  ===&lt;br /&gt;
&lt;br /&gt;
''Michael Craigue, Dell'' &lt;br /&gt;
&lt;br /&gt;
Dell has a reputation for IT simplification and a lean cost structure. We take the same approach with our application security program. This talk covers money-saving tips in the creation and evolution of Dell's Security Development Lifecycle, including risk assessments, security reviews, threat modeling, source code scans, awareness/training, application security user groups, security consulting staff development, and assurance scans/penetration testing. We’ll discuss how we have adapted our program to our IT, Product Group, and Services organizations. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Product Security Management in Agile Product Management  ===&lt;br /&gt;
&lt;br /&gt;
''Antti Vähä-Sipilä, Nokia'' &lt;br /&gt;
&lt;br /&gt;
This paper provides a model for product security risk management and security requirements elicitation in an agile product management framework, using the concepts of Scrum and an epics-based agile requirements model. The paper documents some real-life experiences of rolling out such a risk management model. The model addresses security threat analysis and risk acceptance, and is agnostic to the actual security engineering practices employed in the Scrum teams, and is scalable over large and small enterprises. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] OWASP Top 10 2010  ===&lt;br /&gt;
&lt;br /&gt;
''Dave Wichers, Aspect Security and OWASP Foundation'' &lt;br /&gt;
&lt;br /&gt;
This presentation will cover the OWASP Top 10 - 2010 (final version). The OWASP Top 10 was originally released in 2003 to raise awareness of the importance of application security. As the field evolves, the Top 10 needs to be periodically updated to keep with up with the times. The Top 10 was updated in 2004 and the last update was in 2007, where it introduced Cross Site Request Forgery (CSRF) as the big new emerging web application security risk. &lt;br /&gt;
&lt;br /&gt;
This update will be based on more sources of web application vulnerability information than the previous versions were when determining the new Top 10. It will also present this information in a more concise, compelling, and consumable manner, and include strong references to the many new openly available resources that can help address each issue, particularly OWASP's new Enterprise Security API (ESAPI) and Application Security Verification Standard (ASVS) projects. &lt;br /&gt;
&lt;br /&gt;
A significant change for this update will be that the OWASP Top 10 will be focused on the Top 10 Risks to Web Applications, not just the most common vulnerabilities. &lt;br /&gt;
&lt;br /&gt;
== DAY 2, TRACK 2  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Demo word.gif]] Promon TestSuite: Client-Based Penetration Testing Tool  ===&lt;br /&gt;
&lt;br /&gt;
''Folker den Braber and Tom Lysemose Hansen, Promon'' &lt;br /&gt;
&lt;br /&gt;
Vulnerability analysis has a wide scope containing both social and technical aspects. An important part of technical vulnerability analysis consists of penetration testing. In most cases, penetration testing is focused on either server side or network layer vulnerabilities. In this demonstration we will have a closer look at vulnerability analysis on the client side, while demonstrating the use of the Promon Testuite testing tool. &lt;br /&gt;
&lt;br /&gt;
Promon TestSuite is designed to use the same vectors as common malware but in a clear and visual way, with varying payloads to illustrate the security issues involved with giving injected code free access to a programs memory. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Detecting and Protecting Your Users from 100% of all Malware - How?  ===&lt;br /&gt;
&lt;br /&gt;
''Bradley Anstis and Ellynora Nicoll, M86 Security'' &lt;br /&gt;
&lt;br /&gt;
This presentation starts with comparing the three common methods of malware detection; traditional signatures, code analysis and behavioral analysis. We will review the strengths, weaknesses and provide in-depth demonstrations of the technology behind them to show what they are capable of. Next we show how these three can be combined to provide better coverage and performance. Finally we layer in another related technology - Application White-listing. Together, is this the silver bullet for Malware? &lt;br /&gt;
&lt;br /&gt;
This session is all about challenging the existing accepted practices for Malware protection. We want to open the minds of the attendees, encourage them to question existing solutions and the incumbent market leading vendors. We want you to also re-evaluate their environment to see if improvements can be made. To that end the objectives of this session are to: &lt;br /&gt;
&lt;br /&gt;
1. Provide a ‘warts and all’ review of three malware detection methods complete with demonstrations 2. Use this information to score them in terms of coverage, time to protect and scanning performance 3. Demonstrate how we can use all three of these technologies, layered together, to provide an even better solution 4. Finally, further strengthen this solution set up by adding in Application White-listing to further minimize any possible malware infection &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Responsibility for the Harm and Risk of Software Security Flaws  ===&lt;br /&gt;
&lt;br /&gt;
''Cassio Goldschmidt, Symantec Corp'' &lt;br /&gt;
&lt;br /&gt;
Who is responsible for the harm and risk of security flaws? The advent of worldwide networks such as the internet made software security (or the lack of software security) become a problem of international proportions. There are no mathematical/statistical risk models available today to assess networked systems with interdependent failures. Without this tool, decision-makers are bound to overinvest in activities that don’t generate the desired return on investment or under invest on mitigations, risking dreadful consequences. Experience suggests that no party is solely responsible for the harm and risk of software security flaws but a model of partial responsibility can only emerge once the duties and motivations of all parties are examine and understood. &lt;br /&gt;
&lt;br /&gt;
State of the art practices in software development won’t guarantee products free of flaws. The infinite principles of mathematics are not properly implemented in modern computer hardware without having to truncate numbers and calculations. Many of the most common operating systems, network protocols and programming languages used today were first conceived without the basic principles of security in mind. Compromises are made to maintain compatibility of newer versions of these systems with previous versions. Evolving software inherits all flaws and risks that are present in this layered and interdependent solution. Lastly, there are no formal ways to prove software correctness using neither mathematics nor definitive authority to assert the absence of vulnerabilities. The slightest coding error can lead to a fatal flaw. Without a doubt, vulnerabilities in software applications will continue to be part of our daily lives for years to come. &lt;br /&gt;
&lt;br /&gt;
Decisions made by adopters such as whether to install a patch, upgrade a system or employed insecure configurations create externalities that have implications on the security of other systems. Proper cyber hygiene and education are vital to stop the proliferation of computer worms, viruses and botnets. Furthermore, end users, corporations and large governments directly influence software vendors’ decisions to invest on security by voting with their money every time software is purchased or pirated. &lt;br /&gt;
&lt;br /&gt;
Security researchers largely influence the overall state of software security depending on the approach taken to disclose findings. While many believe full disclosure practices helped the software industry to advance security in the past, several of the most devastating computer worms were created by borrowing from information detailed by researcher’s full disclosure. Both incentives and penalties were created for security researchers: a number of stories of vendors suing security researchers are available in the press. Some countries enacted laws banning the use and development of “hacking tools”. At the same time, companies such as iDefense promoted the creation of a market for security vulnerabilities providing rewards that are larger than a year’s worth of salary for a software practitioner in countries such as China and India. &lt;br /&gt;
&lt;br /&gt;
Effective policy and standards can serve as leverage to fix the problem either by providing incentives or penalties. Attempts such PCI created a perverse incentive that diverted decision makers’ goals to compliance instead of security. Stiff mandates and ineffective laws have been observed internationally. Given the fast pace of the industry, laws to combat software vulnerabilities may become obsolete before they are enacted. Alternatively, the government can use its own buying power to encourage adoption of good security standards. One example of this is the Federal Desktop Core Configuration (FDCC). &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Hacking by Numbers  ===&lt;br /&gt;
&lt;br /&gt;
''Tom Brennan, WhiteHat Security and OWASP Foundation'' &lt;br /&gt;
&lt;br /&gt;
There is a difference between what is possible and what is probable, something we often lose sight of in the world of information security. For example, a vulnerability represents a possible way for an attacker to exploit an asset, but remember not all vulnerabilities are created equal. Obviously we must also keep in mind that just because a vulnerability exists does not necessarily mean it will be exploited, or indicate by whom or to what extent. Clearly, many vulnerabilities are very serious leaving the door open to compromise of sensitive information, financial loss, brand damage, violation of industry regulations, and downtime. Some vulnerabilities are more difficult to exploit than others and therefore attract different attackers. Autonomous worms &amp;amp;amp; viruses may attack one type of issue, while a sentient targeted attacker may prefer another path. Better understanding of these factors enables us to make informed business decisions about website risk management and what is probable. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Presentation word.gif]] Application Security Scoreboard in the Sky  ===&lt;br /&gt;
&lt;br /&gt;
''Chris Eng, Veracode'' &lt;br /&gt;
&lt;br /&gt;
This presentation will discuss vulnerability metrics gathered from real-world applications. The statistics are derived from continuously updated data collected by Veracode’s cloud-based code analysis service. The anonymized data represents a total of nearly 1,600 applications submitted for analysis by large and small companies, commercial software providers, open source projects, and software outsourcers between February 2007 and January 2010. This is the first vulnerability analytics study of this magnitude that incorporates data from both static analysis and dynamic analysis. &lt;br /&gt;
&lt;br /&gt;
We will compare the relative security of applications by industry and origin, and we will examine detailed vulnerability distribution data in the context of taxonomies such as the OWASP Top Ten and the CWE/SANS Top 25 Programming Errors. &lt;br /&gt;
&lt;br /&gt;
== DAY 2, TRACK 3  ==&lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] A Taint Mode for Python via a Library  ===&lt;br /&gt;
&lt;br /&gt;
''Juan José Conti, Universidad Tecnológica Nacional, and Alejandro Russo, Chalmers University of Technology'' &lt;br /&gt;
&lt;br /&gt;
Vulnerabilities in web applications present threats to on-line systems. SQL injection and cross-site scripting attacks are among the most common threats found nowadays. These attacks are often result of improper or none input validation. To help discover such vulnerabilities, taint analyses have been developed in popular web scripting languages like Perl, Ruby, PHP, and Python. Such analysis are often implemented as an execution monitor, where the interpreter needs to be adapted to provide a taint mode. However, modifying interpreters might be a major task in its own right. In fact, it is very probably that new releases of interpreters require to be adapted to provide a taint mode. Differently from previous approaches, we show how to provide a taint analysis for Python via a library written entirely in Python, and thus avoiding modifications in the interpreter. The concepts of classes, decorators and dynamic dispatch makes our solution lightweight, easy to use, and particularly neat. With minimal or none effort, the library can be adapted to work with different Python interpreters. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] OPA: Language Support for a Sane, Safe and Secure Web  ===&lt;br /&gt;
&lt;br /&gt;
''David Rajchenbach-Teller and François-Régis Sinot, MLstate'' &lt;br /&gt;
&lt;br /&gt;
Web applications and services have critical needs in terms of safety, security and privacy: they need to remain available constantly and can at any time be the object of attacks by malicious and anonymous distant users attempting to take control, alter data or steal it, or cause unwanted behaviors. Unfortunately, recent history shows numerous cases of popular web applications falling victim to such attacks, despite careful attempts to secure them. &lt;br /&gt;
&lt;br /&gt;
In this paper, we introduce OPA (One Pot Application), a new platform designed to make web development sane, safe and secure. OPA provides an integrated methodology where the complete application is written with one simple language with consistent semantics, enforces safe use of the infrastructure through compile-time static checking and a novel programming paradigm suited to the web and encourages correct-by-construction development. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Secure the Clones: Static Enforcement of Policies for Secure Object Copying  ===&lt;br /&gt;
&lt;br /&gt;
''Thomas Jensen and David Pichardie, INRIA Rennes - Bretagne Atlantique'' &lt;br /&gt;
&lt;br /&gt;
Exchanging mutable data objects with untrusted code is a delicate matter because of the risk of creating a data space that is accessible by both a code and an attacker. Consequently, secure programming guidelines for Java stress the importance of using defensive copying before accepting or handing out references to an internal mutable object. However, implementation of a copy method (like clone()) is entirely left to the programmer. It may not provide a sufficiently deep copy of an object and is subject to overriding by a malicious sub-class. Currently no language-based mechanism supports secure object cloning. &lt;br /&gt;
&lt;br /&gt;
This paper proposes a type-based annotation system for defining modular cloning policies for class-based object-oriented programs. It provides a static enforcement mechanism that will guarantee that all classes fulfill their copying policy, even in the presence of overriding of copy methods, and establishes the semantic correctness of the overall approach. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] Safe Wrappers and Sane Policies for Self Protecting JavaScript  ===&lt;br /&gt;
&lt;br /&gt;
''Jonas Magazinius, Phu H. Phung, and David Sands, Chalmers Univ. of Technology'' &lt;br /&gt;
&lt;br /&gt;
Phung et al (ASIACCS’09) describe a method for wrapping built-in methods of JavaScript programs in order to enforce security policies. The method is appealing because it requires neither deep transformation of the code nor browser modification. Unfortunately the implementation outlined suffers from a range of vulnerabilities, and policy construction is restrictive and error prone. In this paper we address these issues to provide a systematic way to avoid the identified vulnerabilities, and make it easier for the policy writer to construct declarative policies – i.e. policies upon which attacker code has no side effects. &lt;br /&gt;
&lt;br /&gt;
=== [[Image:OWASP AppSec Research 2010 Research word.gif]] On the Privacy of File Sharing Services  ===&lt;br /&gt;
&lt;br /&gt;
''Nick Nikiforakis, Francesco Gadaleta, Yves Younan, and Wouter Joosen, Katholieke Universiteit Leuven'' &lt;br /&gt;
&lt;br /&gt;
File sharing services are used daily by tens of thousands of people as a way of sharing files. Almost all such services, use a security-through-obscurity method of hiding the files of one user from others. For each uploaded file, the user is given a secret URL which supposedly cannot be guessed. The user can then share his uploaded file by sharing this URL with other users of his choice. Unfortunately though, a number of file sharing services are incorrectly implemented allowing an attacker to guess valid URLs of millions of files and thus allowing him to enumerate their file database and access all of the uploaded files. In this paper, we study some of these services and we record their incorrect implementations. We design automatic enumerators for two such services and a privacy-classifying module which characterises an uploaded file as private or public. Using this technique we gain access to thousands of private files ranging from private and company documents to personal photographs. We present a taxonomy of the private files found and ways that the users and services can protect themselves against such attacks. &lt;br /&gt;
&lt;br /&gt;
==== Registration  ====&lt;br /&gt;
&lt;br /&gt;
== Registration is now OPEN  ==&lt;br /&gt;
&lt;br /&gt;
'''[http://guest.cvent.com/i.aspx?4W%2cM3%2c717e8a7c-4453-47ff-addb-721306529534 Click Here To Register]''' &lt;br /&gt;
&lt;br /&gt;
Note: To save on processing expenses, all fees paid for the OWASP conference are non-refundable. OWASP can accommodate transfers of registrations from one person to another, if such an adjustment becomes necessary. &lt;br /&gt;
&lt;br /&gt;
== Stay Informed ... and Tell Others  ==&lt;br /&gt;
&lt;br /&gt;
[https://lists.owasp.org/mailman/listinfo/appsec_eu_2010 Subscribe to the conference '''mailing list''']. This is the official information channel and you'll be the first to know about the program, invited speakers, opening of registration for training etc. &lt;br /&gt;
&lt;br /&gt;
[http://events.linkedin.com/OWASP-AppSec-Research-2010/pub/185990 Add the event to your '''LinkedIn''' profle] to tell all your business contacts that AppSec Research 2010 is the place to be. &lt;br /&gt;
&lt;br /&gt;
Then get on the '''Twitter''' stream by using the tags '''#OWASP''' and '''#AppSecEU'''. &lt;br /&gt;
&lt;br /&gt;
== Conference Fees (June 23-24)  ==&lt;br /&gt;
&lt;br /&gt;
*Regular registration: €350 &lt;br /&gt;
*OWASP individual member (not just chapter member): €300 &lt;br /&gt;
*Full-time students*: €225&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*&amp;lt;/nowiki&amp;gt; We need some kind of proof of your full-time student status. Either ask your local OWASP chapter leader to vouch for you by email to Kate.Hartmann@owasp.org, or email Kate a scanned image of your student ID (please compress the file size&amp;amp;nbsp;:). &lt;br /&gt;
&lt;br /&gt;
== Training Fee (June 21-22)  ==&lt;br /&gt;
&lt;br /&gt;
*Training fee is €990 for two days, see Training tab above&lt;br /&gt;
&lt;br /&gt;
==== Travel &amp;amp;amp; Hotels  ====&lt;br /&gt;
&lt;br /&gt;
== Travel  ==&lt;br /&gt;
&lt;br /&gt;
Stockholm's foremost international airport is Arlanda (ARN). Clean and convenient speed trains will take you between Arlanda and Stockholm Central in 20 minutes. You can also fly to Stockholm Skavsta (NYO) or Stockholm Västerås (VST) where coaches take you to Stockholm Central in 1 h 20 min. &lt;br /&gt;
&lt;br /&gt;
== Accommodation  ==&lt;br /&gt;
&lt;br /&gt;
You can choose hotel/hostel freely in Stockholm but we provide three suggestions with pre-booked rooms. Before you book '''check with sites like [http://www.hotels.com hotels.com] since they might have better prices for the very same hotels!''' &lt;br /&gt;
&lt;br /&gt;
[[Image:Stockholm map with hotels and public transportation.jpg]] &lt;br /&gt;
&lt;br /&gt;
Subways and buses are convenient and safe and will take you right up to the venue (station/stop &amp;quot;Universitetet&amp;quot;) from these three hotels: &lt;br /&gt;
&lt;br /&gt;
'''Best Western Time Hotel'''&amp;lt;br&amp;gt; Why? Closest to the university, direct bus or subway to the conference&amp;lt;br&amp;gt; [http://www.timehotel.se/index.aspx?languageID=5 Best Western Time Hotel]&amp;lt;br&amp;gt; Single room: 1395 SEK/€145/$195&amp;lt;br&amp;gt; Double room: 1575 SEK/€160/$220&amp;lt;br&amp;gt; Rooms pre-booked until May 6 under code &amp;quot;G#73641 OWASP&amp;quot;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Scandic Continental'''&amp;lt;br&amp;gt; Why? Right at the Central Station, convenient travel to and from airport, direct subway to the conference&amp;lt;br&amp;gt; [http://www.scandichotels.com/en/Hotels/Countries/Sweden/Stockholm/Hotels/Scandic-Continental-Stockholm/ Scandic Continental]&amp;lt;br&amp;gt; Single room: 1590 SEK/€165/$220&amp;lt;br&amp;gt; Double room: 1690 SEK/€175/$235&amp;lt;br&amp;gt; Rooms pre-booked until early May under code &amp;quot;OWASP&amp;quot;&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Fridhemsplan's Hostel'''&amp;lt;br&amp;gt; Why? Affordable stay in Stockholm's nicest hostel, direct bus to the conference&amp;lt;br&amp;gt; [http://fridhemsplan.se/?p=Main&amp;amp;c= Fridhemsplan's Hostel]&amp;lt;br&amp;gt; Rooms cost €35-€55 ($50-$80)&amp;lt;br&amp;gt; Booking via John Wilander (john.wilander@owasp.org). First-come-first-served with priority to students or people who have the need&amp;amp;nbsp;;). &lt;br /&gt;
&lt;br /&gt;
==== Venue  ====&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Aula Magna.jpg]] &lt;br /&gt;
&lt;br /&gt;
==== Sponsoring  ====&lt;br /&gt;
&amp;lt;center&amp;gt;&lt;br /&gt;
[[Image:AppSec Research 2010 Microsoft diamond sponsor.jpg|250px|Microsoft - Diamond Sponsor]] [[Image:AppSec Research 2010 Google 20k sponsor.jpg|150px|Google - Dinner Party and Expo Sponsor]] [[Image:Portwise logo.png|130px|PortWise - Gold and Badge Sponsor]] [[Image:Cybercom logo.png|100px|Cybercom - Gold Sponsor]] [[Image:Fortify logo AppSec Research 2010.png|120px|Fortify - Gold Sponsor]] [[Image:Omegapoint logo.png|110px|Omegapoint - Gold Sponsor]] [[Image:Mnemonic logo.png|100px|Mnemonic - Silver Sponsor]] [[Image:AppSec Research 2010 sponsor Nixu logo.jpg|100px|NIXU - Silver Sponsor]] [[Image:hps_logo.png|130px|High Performance Systems - Silver sponsor]] [[Image:IIS logo.png|100px|Stiftelsen för Internetinfrastruktur - Lunch Sponsor]] [[Image:MyNethouse logo.png|100px|MyNethouse - Coffee Break Sponsor]] [[Image:AppSec Research 2010 Help Net Security sponsor.jpg|100px|Help Net Security - Media Sponsor]] &lt;br /&gt;
&amp;lt;/center&amp;gt; &lt;br /&gt;
We are now welcoming sponsors for OWASP AppSec Research 2010. Take the opportunity to support next year's major appsec event in Europe! The full sponsoring program is available as pdfs: &lt;br /&gt;
&lt;br /&gt;
Sponsoring program in English:&amp;amp;nbsp;[[Image:OWASP Sponsorship AppSec Research 2010 (eng).pdf]] &lt;br /&gt;
&lt;br /&gt;
Sponsoring program in Swedish:&amp;amp;nbsp;[[Image:OWASP Sponsorship AppSec Research 2010 (swe).pdf]] &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp appsec research 2010 diamond gold silver sponsoring.png|left|Part of the sponsoring program]] [[Image:Owasp appsec research 2010 sponsoring 2.png|left|Part of the sponsoring program]] &lt;br /&gt;
&lt;br /&gt;
==== Challenges  ====&lt;br /&gt;
&lt;br /&gt;
=== Countdown Challenges -- Free Tickets to Win!  ===&lt;br /&gt;
&lt;br /&gt;
There will be a challenge posted on the conference wiki page the 21st every month up until the event. The winner will get free entrance to the conference. Be sure to sign up for [https://lists.owasp.org/mailman/listinfo/appsec_eu_2010 the conference mailing list] to get a monthly reminder. &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge 11: Share Your OWASP AppSec Postcards  ==&lt;br /&gt;
&lt;br /&gt;
Here's the second last chance to win a free ticket to the conference. This time we challenge you to create OWASP AppSec Research Postcards (digital ones of course) from nice places throughout the world hold a paper like the picture below.&lt;br /&gt;
&lt;br /&gt;
[[Image:OWASP_AppSec_Research_2010_Postcard_Challenge.jpg‎]]&lt;br /&gt;
&lt;br /&gt;
== How to Win ==&lt;br /&gt;
Create and share the most &amp;quot;digital postcards&amp;quot; showing you, the conference logo on paper ([http://www.owasp.org/images/5/52/OWASP_AppSec_Research_2010_Postcard_Challenge.pdf pdf]), and ...&lt;br /&gt;
&lt;br /&gt;
* Your work office or &amp;quot;computer room&amp;quot; at home: 1 point&lt;br /&gt;
* A major city (&amp;gt; 1 million inhabitants) with the city sign &amp;quot;Welcome to ...&amp;quot;: 2 points&lt;br /&gt;
* On a continent which you don't live: 2 points&lt;br /&gt;
* Under water (outside, not in a pool or a bathtub): 2 points&lt;br /&gt;
* A capital city with a typical sight, e g The Eiffel Tower in Paris: 3 points&lt;br /&gt;
* With someone from our &amp;quot;Who's Who in Security&amp;quot; challenge holding the logo: 3 points&lt;br /&gt;
* With an international celebrity holding the logo: 5 points&lt;br /&gt;
* 4,000 meters or more above sea level, not flying: 6 points&lt;br /&gt;
* With Chuck Norris, Mr. T, or Paris Hilton: 30 points&lt;br /&gt;
&lt;br /&gt;
You get points for every unique postcard, meaning once under water, once in a specific city, once with a unique celebrity, once per mountain above 4,000 meters etc. If you combine categories you get the sum of the points. Most points by May 20th wins a free conference ticket!&lt;br /&gt;
&lt;br /&gt;
== How to Compete ==&lt;br /&gt;
Share your postcards on http://www.Flickr.com following this example (3 points for Eiffel Tower in Paris):&lt;br /&gt;
&lt;br /&gt;
* '''Photo''' of you, the conference logo on paper using [http://www.owasp.org/images/5/52/OWASP_AppSec_Research_2010_Postcard_Challenge.pdf this pdf], and the Eiffel Tower in the background&lt;br /&gt;
* '''Title''': OWASP Challenge Postcard Paris&lt;br /&gt;
* '''Description''': Capital city Paris, typical site The Eiffel Tower, 3 points&lt;br /&gt;
* '''Tag''': #AppSecEu&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==== Archive  ====&lt;br /&gt;
&lt;br /&gt;
== Call for Papers and Proposals (closed)  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 2nd cfp.png]] &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; 1. '''Publish or Perish'''. Peer-reviewed 12 page papers to be published in formal proceedings by Springer-Verlag ([http://www.springer.com/lncs Lecture Notes in Computer Science, LNCS]). Presentation slides and video takes will be posted on the OWASP wiki after the conference.&amp;lt;br&amp;gt; 2. '''Demo or Die'''. A demo proposal should consist of a pdf with a 1 page abstract summarizing the matter proposed by the speaker(s) ''and'' 1 page containing demo screenshot(s). Demos will have ordinary speaker slots but the speakers are expected to run a demo during the talk (live coding counts as a demo), not just a slideshow. Presentation slides and video takes will be posted on the OWASP wiki after the conference.&amp;lt;br&amp;gt; 3. '''Present or Repent'''. A presentation proposal should consist of a 2 page extended abstract representing the essential matter proposed by the speaker(s). Presentation slides and video takes will be posted on the OWASP wiki after the conference. &lt;br /&gt;
&lt;br /&gt;
If you have any questions regarding submissions etc, please email john.wilander@owasp.org. &lt;br /&gt;
&lt;br /&gt;
=== Topics of Interest  ===&lt;br /&gt;
&lt;br /&gt;
We encourage the publication and presentation of new tools, new methods, empirical data, novel ideas, and lessons learned in the following areas: &lt;br /&gt;
&lt;br /&gt;
•&amp;amp;nbsp; &amp;amp;nbsp; Web application security&amp;lt;br&amp;gt; • &amp;amp;nbsp; &amp;amp;nbsp;Security aspects of new/emerging web technologies/paradigms (mashups, web 2.0,&amp;amp;nbsp; offline support, etc)&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; Security in web services, REST, and service oriented architectures&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; Security in cloud-based services&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; Security of frameworks (Struts, Spring, ASP.Net MVC etc)&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; New security features in platforms or languages&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; Next-generation browser security&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; Security for the mobile web&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; Secure application development (methods, processes etc)&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; Threat modeling of applications&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; Vulnerability analysis (code review, pentest, static analysis etc)&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; Countermeasures for application vulnerabilities&amp;lt;br&amp;gt; •&amp;amp;nbsp; &amp;amp;nbsp; Metrics for application security&amp;lt;br&amp;gt; • &amp;amp;nbsp; &amp;amp;nbsp;Application security awareness and education &lt;br /&gt;
&lt;br /&gt;
=== Submission Deadline and Instructions  ===&lt;br /&gt;
&lt;br /&gt;
'''Update''': Submission deadline for full-papers (&amp;quot;Publish or Perish&amp;quot;) has been '''extended to March 7th 23:59''' (Apia, Samoa time) due to numerous requests. Submit your paper to [https://www.easychair.org/login.cgi?a=c01e98d04e4e;iid=20045 AppSec Research 2010 (EasyChair)]. &lt;br /&gt;
&lt;br /&gt;
Full-paper submissions should be at most 12 pages long and must be in the Springer LNCS style for &amp;quot;Proceedings and Other Multiauthor Volumes&amp;quot;. Templates for preparing papers in this style for LaTeX, Word, etc can be downloaded from: http://www.springer.com/computer/lncs?SGWID=0-164-7-72376-0. Full papers must be submitted in a form suitable for anonymous review: '''remove author names and affiliations from the title page, and avoid explicit self-referencing in the text'''. &lt;br /&gt;
&lt;br /&gt;
Submission for &amp;quot;Demo or Die&amp;quot; and &amp;quot;Present or Repent&amp;quot; closed on February 7th. &lt;br /&gt;
&lt;br /&gt;
Decision notification: April 7th &lt;br /&gt;
&lt;br /&gt;
=== Program Committee (for review of full-papers)  ===&lt;br /&gt;
&lt;br /&gt;
• John Wilander, Omegapoint and Linköping University (chair)&amp;lt;br&amp;gt; • Alan Davidson, Stockholm University/Royal Institute of Technology (co-host)&amp;lt;br&amp;gt; • Lieven Desmet, Katholieke Universiteit Leuven&amp;lt;br&amp;gt; • Úlfar Erlingsson, Reykjavík University and Microsoft Research&amp;lt;br&amp;gt; • Martin Johns, University of Passau&amp;lt;br&amp;gt; • Christoph Kern, Google&amp;lt;br&amp;gt; • Engin Kirda, Institute Eurecom&amp;lt;br&amp;gt; • Ulf Lindqvist, SRI International&amp;lt;br&amp;gt; • Benjamin Livshits, Microsoft Research&amp;lt;br&amp;gt; • Sergio Maffeis, Imperial College London&amp;lt;br&amp;gt; • John Mitchell, Stanford University&amp;lt;br&amp;gt; • William Robertson, UC Berkeley&amp;lt;br&amp;gt; • Andrei Sabelfeld, Chalmers UT&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== Call for Training (closed)  ==&lt;br /&gt;
&lt;br /&gt;
(Info kept here for reference)&amp;lt;br&amp;gt; OWASP is currently soliciting training proposals for the OWASP AppSec Research 2010 Conference which will take place at Stockholm University in Sweden, on June 21st through June 24th 2010. There will be training courses on June 21st and 22nd followed by plenary sessions on the 23rd and 24th with three tracks per day. &lt;br /&gt;
&lt;br /&gt;
We are seeking training proposals on the following topics (in no particular order): &lt;br /&gt;
&lt;br /&gt;
*Security in Web 2.0, Web Services/XML &lt;br /&gt;
*Advanced penetration testing &lt;br /&gt;
*Static analysis for security &lt;br /&gt;
*Threat modeling of applications &lt;br /&gt;
*Secure coding practices &lt;br /&gt;
*Security in J2EE/.NET patterns and frameworks &lt;br /&gt;
*Application security with ESAPI &lt;br /&gt;
*OWASP tools in practice&lt;br /&gt;
&lt;br /&gt;
We will look favourably on laboration-based/hands-on training. &lt;br /&gt;
&lt;br /&gt;
=== Submission Deadline and Instructions  ===&lt;br /&gt;
&lt;br /&gt;
Submission '''deadline is Sunday February 7th 23:59''' (Apia, Samoa time). To submit your training proposal please fill out the [[Image:OWASP AppSec Research 2010 Call for Training.docx]] and email it to john.wilander@owasp.org with subject &amp;quot;AppSec Research 2010: Training proposal&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Upon acceptance you'll be requested to fill out the ''Training Instructor Agreement'' where you'll find details on revenue split etc. The agreement will be reworked but the previous one is here: [[Image:Training Instructor Agreement.doc]]. &lt;br /&gt;
&lt;br /&gt;
=== Upcoming List of Trainers on OWASP Wiki  ===&lt;br /&gt;
&lt;br /&gt;
As part of the [http://www.owasp.org/index.php/Category:OWASP_Education_Project OWASP Education Project], OWASP is starting an official list of trainers on the OWASP web site. This list (mentioning the trainer - course and contact details) will cover all trainers that performed training at OWASP conferences, together with their aggregated scores on the course feedback forms. Of course, this is opt-in. Please let us know if you are interested to participate in this program (tick the check-box on the application form). &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge X: Build an Enterprise Java Rootkit ==&lt;br /&gt;
&lt;br /&gt;
The tenth challenge is here! &lt;br /&gt;
&lt;br /&gt;
Jeff Williams, chairman of OWASP, gave a very interesting talk at last year's Black Hat US and OWASP AppSec US -- [http://www.blackhat.com/presentations/bh-usa-09/WILLIAMS/BHUSA09-Williams-EnterpriseJavaRootkits-PAPER.pdf &amp;quot;Enterprise Java Rootkits -- Hardly Anyone Watches the Developers&amp;quot;]. Now it's time for you to write a rootkit yourself, exploring Jeff's techniques and more. &lt;br /&gt;
&lt;br /&gt;
'''The Project to Fool'''&amp;lt;br&amp;gt; Your assignment is to be the evil developer who implements and hides a backdoor in a Java servlet. We've implemented a very simple login web application and exported the Eclipse project ([http://www.owasp.org/images/1/16/OWASP_AppSec_Research_2010_Challenge_X.zip zip here]). We will use this project to evaluate your submissions. It's a simple servlet/jsp project that we deployed on Tomcat 6.0. It even contains an evil output of user credentials to a temp file (not yet hidden though) to get you started. Screenshot from the app and the project structure: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; [[Image:Appsec research 2010 challenge X eclipse project.jpg]] [[Image:Appsec research 2010 challenge X login screen.jpg]] &lt;br /&gt;
&lt;br /&gt;
'''Rules'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*You must explain what your changes do (we need to evaluate your rootkit!) &lt;br /&gt;
*The original features + look and feel must be preserved &lt;br /&gt;
*Your additions should preferably look like security features such as IP whitelisting, logging, anti-CSRF, frequency blocking etc. &lt;br /&gt;
*You're only allowed to change the servlet (Login.java), and the gif image (appsec_research_challenge_X.gif) &lt;br /&gt;
*You do not have to use the jsps &lt;br /&gt;
*The original size of Login.java is 1,856 bytes and it mustn't grow to more than 4,000 bytes &lt;br /&gt;
*The gif image mustn't grow in size and should look close enough to the original to fool the committee &lt;br /&gt;
*Code should &amp;quot;look&amp;quot; readable, i e not minimized too heavily&lt;br /&gt;
&lt;br /&gt;
'''How To Win'''&amp;lt;br&amp;gt; The organization committee will evaluate who has been able to hide the most evil stuff while complying to the rules. The more malicious functionality and the more clever disguise -- the more &amp;quot;points&amp;quot;. All submissions must be posted as links or pasted code in [http://sla.ckers.org/forum/read.php?11,33928 this sla.ckers.org thread]. Send an email to john.wilander@owasp.org when you post code or need attention. Deadline April 20. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge 9: Crack 'Em Hashes (closed)  ==&lt;br /&gt;
&lt;br /&gt;
February's AppSec Research 2010 challenge is about breaking hashed passwords. It starts off easy with the old LM hash and ends with SHA256 and GOST3411. &lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp appsec research 2010 hash challenge.jpg]] &lt;br /&gt;
&lt;br /&gt;
'''How To Win'''&amp;lt;br&amp;gt; The first one to publish each broken password gets points according to the table below but at the same time helps the others since the password is the salt of the next hash. So you have to decide -- should you publish your cracked password and collect your points before the others or should you keep it a secret to get a head start cracking the next one? Deadline it March 21st. &lt;br /&gt;
&lt;br /&gt;
To collect points for a password you must be the first one to publish that broken password on [http://sla.ckers.org/forum/read.php?11,33533 this sla.ckers.org thread]. Please send an email to john.wilander@owasp.org at the same time so we can correct any misunderstandings. For instance we can happen to run into hash collisions, where someone finds another mixed alpha password of max 5 characters that concatenated with the right salt produces the same hash. In such a case we will publish the real password and give points to the one who found the collision. &lt;br /&gt;
&lt;br /&gt;
The one with the most points on March 21st wins a free ticket to the conference! &lt;br /&gt;
&lt;br /&gt;
'''Points to Earn'''&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
*pwd1 (LM) =&amp;amp;gt; 1 point &lt;br /&gt;
*pwd2 (MD2) =&amp;amp;gt; 3 points &lt;br /&gt;
*pwd3 (MD4) =&amp;amp;gt; 5 points &lt;br /&gt;
*pwd4 (MD5) =&amp;amp;gt; 9 points &lt;br /&gt;
*pwd5 (RIPEMD160) =&amp;amp;gt; 15 points &lt;br /&gt;
*pwd6 (SHA1) =&amp;amp;gt; 25 points &lt;br /&gt;
*pwd7 (SHA256) =&amp;amp;gt; 50 points &lt;br /&gt;
*pwd8 (GOST3411) =&amp;amp;gt; 100 points&lt;br /&gt;
&lt;br /&gt;
'''The Hashes'''&amp;lt;br&amp;gt; Each password comprises of a-zA-Z (mixed alpha) and is max 5 characters long. With salt that means max 10 mixed alpha characters as input to the hash function. All hashes here are in hex format. The Java source code has all the details. The plus operator means string concatenation. &lt;br /&gt;
&lt;br /&gt;
*LM(pwd1) 0C04DACA901299DBAAD3B435B51404EE &lt;br /&gt;
*MD2(pwd2 + pwd1) 16189F5462BF906E9D88CF6F152DE86F &lt;br /&gt;
*MD4(pwd3 + pwd2) FA8F46A6D347087D6980C3FA77DD4DE9 &lt;br /&gt;
*MD5(pwd4 + pwd3) 425B33D6F60394C897B8413B5C185845 &lt;br /&gt;
*RIPEMD160(pwd5 + pwd4) 35F34671D30472D403937820DCABC1C78C837071 &lt;br /&gt;
*SHA1(pwd6 + pwd5) AE81A30510B2931921934218636B26A803330EB1 &lt;br /&gt;
*SHA256(pwd7 + pwd6) B2FF0269E927C6559804A37590A0688C45DF143F85CEE0E3F239F846B65C9644 &lt;br /&gt;
*GOST3411(pwd8 + pwd7) 16CC9F1FF65688E040F5ADA82A41A258FF948769CDA4C4A17D85228A6F358971&lt;br /&gt;
&lt;br /&gt;
Example: Given that pwd1 is &amp;quot;Win&amp;quot; and pwd2 is &amp;quot;You&amp;quot;, the hash 16189F5462BF906E9D88CF6F152DE86F is the result of MD2(&amp;quot;YouWin&amp;quot;). Now pwd2 will be the salt when you crack pwd3. &lt;br /&gt;
&lt;br /&gt;
'''The Source Code'''&amp;lt;br&amp;gt; The source code we've used to produce the hashes is available here [http://www.owasp.org/images/7/79/OwapsAppSecResearch2010HashChallenge.zip zip]. It's Java and all but the LM hash is done with [http://www.bouncycastle.org/latest_releases.html Bouncy Castle 1.4.5]. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge 8: Construct an OWASP Polyglot (closed)  ==&lt;br /&gt;
&lt;br /&gt;
January's AppSec Research Challenge is to construct an OWASP polyglot, more specifically '''an OWASP logo that also can be run as JavaScript''': &lt;br /&gt;
&lt;br /&gt;
Show image: &amp;amp;lt;img src=&amp;quot;owasp_logo.gif&amp;quot;&amp;amp;gt;&amp;lt;br&amp;gt;Run script: &amp;amp;lt;script src=&amp;quot;owasp_logo.gif&amp;quot;&amp;amp;gt;&amp;amp;lt;/script&amp;amp;gt; &lt;br /&gt;
&lt;br /&gt;
[http://en.wikipedia.org/wiki/Polyglot_(computing) Wikipedia] says: &amp;quot;a ''polyglot'' is a computer program or script written in a valid form of multiple programming languages&amp;quot;. This is about as cool as it gets&amp;amp;nbsp;:). &lt;br /&gt;
&lt;br /&gt;
'''Rules''' &lt;br /&gt;
&lt;br /&gt;
*Make your polyglot out of the regular OWASP logo in the upper left corner of this wiki (circle with the wasp). &lt;br /&gt;
*The file size must not grow. &lt;br /&gt;
*Pixel colors in the gif must not differ more than 5 in red, green, or blue. Ex: If a pixel originally had rgb 100,100,100 then 104,95,96 is OK. &lt;br /&gt;
*No malicious stuff of course &lt;br /&gt;
*When your polyglot is run as JavaScript it should execute as many of the following features as possible, starting from the top:&lt;br /&gt;
&lt;br /&gt;
#alert(all cookies belonging to the current domain); &lt;br /&gt;
#alert(the last keystrokes on the keyboard every ten keystrokes); &lt;br /&gt;
#alert(the current time in Stockholm, once every minute); &lt;br /&gt;
#A quine. The polyglot outputs its own source code on the HTML page.&lt;br /&gt;
&lt;br /&gt;
'''How to get started''' &lt;br /&gt;
&lt;br /&gt;
Jasvir Nagra gave a talk on these kind of polyglots and published a gif/JavaScript polyglot on [http://www.thinkfu.com/blog/gifjavascript-polyglots his blog]. A good starting point is his gif file.&amp;amp;nbsp;Jasvir has also written an extensive article on gif/perl polyglots which explains how to get code into the gif file. Check out [http://search.cpan.org/~jnagra/Perl-Visualize-1.02/Visualize.pm#HOW_IT_ALL_WORKS his guide]. &lt;br /&gt;
&lt;br /&gt;
'''How to win''' &lt;br /&gt;
&lt;br /&gt;
Submit your entries in [http://sla.ckers.org/forum/read.php?11,33121 this sla.ckers.org thread]. Either the first complete polyglot or the most complete polyglot wins. We will most probably provide you with a gif checker that validates the color differences. Check the thread.&amp;amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge 7: X-Mas Capture the Flag (closed)  ==&lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 Stocking.gif]] '''Merry Christmas everyone!'''[[Image:AppSec Research 2010 Stocking.gif]] &lt;br /&gt;
&lt;br /&gt;
It's the 21st and a new AppSec Research Challenge is posted. &lt;br /&gt;
&lt;br /&gt;
Setting up the AppSec Research 2010 X-mas Challenge was a cooperative effort by the winner of AppSec Research Challenge 3, Mario Heiderich, and Martin Holst Swende. It is a multi-step challenge which involves finding a vulnerability in a web application and locating a hidden message. The winner gets free entrance to next year's conference. Start by subscribing to [https://lists.owasp.org/mailman/listinfo/appsec_eu_2010 the conference mailing list]. Then check the simple rules below and get going. &lt;br /&gt;
&lt;br /&gt;
'''Rules''': &lt;br /&gt;
&lt;br /&gt;
*Please do not perform any resource-intensive tests, as the machine is pretty low-end and can be DoS:ed without much effort. &lt;br /&gt;
*The computer at the given IP address is the only system involved in this challenge, so please do not perform any tests of neighboring systems. &lt;br /&gt;
*Otherwise, you are free to hack away!&lt;br /&gt;
&lt;br /&gt;
'''Challenge-page''': [http://66.249.7.26 66.249.7.26] &lt;br /&gt;
&lt;br /&gt;
Discussions, QnA and reports about how far you have made it is welcome at [http://sla.ckers.org/forum/read.php?11,32779 the official sla.ckers thread]. &lt;br /&gt;
&lt;br /&gt;
Good luck and happy holidays! (And don't forget the submission deadline for the conference -- February 7) &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge 6: Design the Conference Logo (closed)  ==&lt;br /&gt;
&lt;br /&gt;
'''Note''': This challenge is re-opened. Submit by February 21st. &lt;br /&gt;
&lt;br /&gt;
November's AppSec Research 2010 Challenge asks you to design the conference logotype. So far we have used this: &lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec research 2010 logo prototype (small).png]] &lt;br /&gt;
&lt;br /&gt;
... but would like something less &amp;quot;word processor-like&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''How to win''' &lt;br /&gt;
&lt;br /&gt;
*The logo should be suitable for both large printing and small web banners &lt;br /&gt;
*If you make a color logo, please submit a b/w version too &lt;br /&gt;
*&amp;quot;OWASP AppSec Research 2010&amp;quot; should in some way be part of the logo&amp;amp;nbsp;:)&lt;br /&gt;
&lt;br /&gt;
'''Copyright?'''&amp;lt;br&amp;gt; By submitting your logo you agree to share it according to [http://creativecommons.org/licenses/by/3.0/legalcode Creative Commons Attributions] and that we credit you in the conference brochure and on the conference wiki but not in all places where we use the logo (i e we will not credit you on banners, sponsoring program, powerpoint presentations etc). &lt;br /&gt;
&lt;br /&gt;
'''How to submit'''&amp;lt;br&amp;gt; Email jpg + svg to john.wilander [at] owasp.org before Monday December 14th 23:59 [http://www.worldtimeserver.com/current_time_in_UTC.aspx UTC]. The creator of the best logo wins a free ticket to the AppSec Research 2010 conference! &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge 5: Graphical Effects (closed)  ==&lt;br /&gt;
&lt;br /&gt;
The October OWASP AppSec Research 2010 challenge is over. The winner of a free entrance ticket to next year's AppSec conference in Stockholm is &amp;quot;sirdarckcat&amp;quot; with FireworksIsNotABrowser_v4 (although we like the slightly oversized v6 better). &lt;br /&gt;
&lt;br /&gt;
The challenge was about '''writing the coolest graphical effect in a 2010 character script'''. &lt;br /&gt;
&lt;br /&gt;
=== An Example  ===&lt;br /&gt;
&lt;br /&gt;
As an example, copy the script below and paste the script over the URL in the URL bar. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;javascript:R=0; x1=.1; y1=.05; x2=.25; y2=.24; x3=1.6; y3=.24; x4=300; y4=200; x5=300; y5=200; DI=document.getElementsByTagName(&amp;quot;img&amp;quot;); DIL=DI.length; function A(){for(i=0; i-DIL; i++){DIS=DI[ i ].style; DIS.position='absolute'; DIS.left=(Math.sin(R*x1+i*x2+x3)*x4+x5)+&amp;quot;px&amp;quot;; DIS.top=(Math.cos(R*y1+i*y2+y3)*y4+y5)+&amp;quot;px&amp;quot;}R++}setInterval('A()',5); void(0)&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
As a simple teaser we give these png letters for the script to play with. &lt;br /&gt;
&lt;br /&gt;
[[Image:AppSec Research 2010 O.png]][[Image:AppSec Research 2010 W.png]][[Image:AppSec Research 2010 A.png]][[Image:AppSec Research 2010 S.png]][[Image:AppSec Research 2010 P.png]] &lt;br /&gt;
&lt;br /&gt;
=== Rules  ===&lt;br /&gt;
&lt;br /&gt;
*The script should work in Firefox 3.5 (yeah, that means HTML5 and CSS3&amp;amp;nbsp;:) &lt;br /&gt;
*Any resource, linked document, script, or image defined on the AppSec Research 2010 wiki page may be loaded/accessed/used &lt;br /&gt;
*No requests to any other location is allowed &lt;br /&gt;
*No obfuscation is allowed &lt;br /&gt;
*The script may only use ASCII &lt;br /&gt;
*Max length of the script is 2010 characters &lt;br /&gt;
*You have to give your effect an id and a version number (further explanation below) &lt;br /&gt;
*Any form of malicious code is of course banned&amp;amp;nbsp;;)&lt;br /&gt;
&lt;br /&gt;
=== How to Compete  ===&lt;br /&gt;
&lt;br /&gt;
There's an [http://sla.ckers.org/forum/read.php?11,31944 official thread on sla.ckers] were you share your code and thoughts (Worried someone will steal you code? Check the originality bullet below). You can enter as many effects as you like but '''each effect has to have an id and a version number''', e.g. JohnWobbler_v1.3 for version 1.3 of John's Wobbler effect. Deadline is November 14th, 23:59 [http://www.worldtimeserver.com/current_time_in_UTC.aspx UTC]. &lt;br /&gt;
&lt;br /&gt;
=== Choosing the Winner  ===&lt;br /&gt;
&lt;br /&gt;
Since this is a creative challenge the OC will choose the winner based on the following: &lt;br /&gt;
&lt;br /&gt;
*'''Originality''' (tweaking someone's code is cool and encouraged but changing a few magic numbers or inverting a function won't make you the winner) &lt;br /&gt;
*'''Coolness''' (yeah, you need to convince a few Scandinavian people + Seba and Kate that your script is the coolest)&lt;br /&gt;
&lt;br /&gt;
Either the OC will choose a winner by ourselves or we choose the top effects and let you guys vote for the winner. &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge 4: Who's Who in Security? (closed)  ==&lt;br /&gt;
&lt;br /&gt;
September's AppSec Research 2010 Challenge was to identify a number of people that are, in one way or another, known in the security business, by their picture. There were thirteen photos in total, portraiting thirteen different individuals. &lt;br /&gt;
&lt;br /&gt;
'''The winner of a free ticket to the OWASP AppSec Research conference in 2010 was Thomas Vollstädt''' who submitted the correct solution just one day after the challenge was posted. &lt;br /&gt;
&lt;br /&gt;
=== The Solution  ===&lt;br /&gt;
&lt;br /&gt;
[[Image:Owasp appsec research 2010 challenge 4 solution.png]] &lt;br /&gt;
&lt;br /&gt;
=== The Names  ===&lt;br /&gt;
&lt;br /&gt;
Dinis Cruz, Gordon &amp;quot;Fyodor&amp;quot; Lyon, David Litchfield, Dave Aitel, Bruce Schneier, Dave Wichers, Gene Spafford, MafiaBoy, MySpace Samy, Tom Brennan, Halvar Flake, Alex Sotirov, Jeff Williams, Jennifer Granick, Kate Hartmann, Mudge, Lance Spitzner, Dan Kaminsky, Brian Chess, Joanna Rutkowska, Crispin Cowan, Michael Howard, Jay Beale, Ross Anderson, Dawn Song, Robert &amp;quot;rsnake&amp;quot; Hansen, and Solar Designer. &lt;br /&gt;
&lt;br /&gt;
=== The Pictures  ===&lt;br /&gt;
&lt;br /&gt;
If you'd like to see the original pictures without the names, here's the link: [[http://www.owasp.org/index.php/File:Owasp_appsec_research_2010_challenge_4.png]] &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge 3: Non-Alphanumeric JavaScript (closed)  ==&lt;br /&gt;
&lt;br /&gt;
The August AppSec Research 2010 Challenge was to create a JavaScript alert(&amp;quot;owasp&amp;quot;) that pops up the word 'owasp', case-insensitive, without using any alphanumeric characters (0-9a-zA-Z).&amp;amp;nbsp;There was a tremendous activity and we want to thank everyone who participated. The size of the final result was almost a third of the first entry (see chart below). '''Want to check out the winning snippet by .mario? Enter the following in the Firebug console''':&amp;amp;nbsp;&amp;lt;nowiki&amp;gt;ω=[[Ṫ,Ŕ,,É,,Á,Ĺ,Ś,,,Ó,Ḃ]=!''+[!{}]+{}][Ś+Ó+Ŕ+Ṫ],ω()[Á+Ĺ+É+Ŕ+Ṫ](Ó+ω()[Ḃ+Ṫ+Ó+Á]('Á«)'))&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
It is based on a few different ideas. First of all, a variable assignment on the form &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[a,b,c,,e]=&amp;quot;abcde&amp;quot; // a=&amp;quot;a&amp;quot;, c=&amp;quot;c&amp;quot;,e=&amp;quot;e&amp;quot;&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
Which is performed on the string &amp;quot;truefalse[object Object]&amp;quot; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;[Ṫ,Ŕ,,É,,Á,Ĺ,Ś,,,Ó,Ḃ]=!''+[!{}]+{}]&amp;lt;/nowiki&amp;gt; // right-hand side is &amp;quot;truefalse[object Object]&amp;quot; &lt;br /&gt;
&lt;br /&gt;
Also, the following construction obtains the window.sort-function, which leaks the window-object when called without arguments&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
ω=[][&amp;quot;sort&amp;quot;] //ω is now window.sort &lt;br /&gt;
&lt;br /&gt;
Therefore, calling ω()[&amp;quot;alert&amp;quot;] invokes window.alert. To generate the string &amp;quot;owasp&amp;quot;, the string &amp;quot;wasp&amp;quot; can be obtained by calling btoa on the characters &amp;lt;nowiki&amp;gt;&amp;quot;Á«)&amp;quot;&amp;lt;/nowiki&amp;gt;. &lt;br /&gt;
&lt;br /&gt;
This was really a great team effort, and I think a lot of us learned some new tricks. The final winner was .mario. Congratulations! &lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec research 2010 challenge 3 chart.jpg]] &lt;br /&gt;
&lt;br /&gt;
=== JavaScript Without Alphanumeric Characters?  ===&lt;br /&gt;
&lt;br /&gt;
It is possible to write valid javascript completely without alphannumeric characters (0-9a-zA-Z). To produce a number, you can instead use for example an empty string, &amp;lt;nowiki&amp;gt;''&amp;lt;/nowiki&amp;gt;, interpret it as a boolean with a bang: &amp;lt;nowiki&amp;gt;!''&amp;lt;/nowiki&amp;gt; -- which leads to the boolean object true. true, interpreted as a numeric value, equals one. Thus, &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;$ = +!''; // $ === 1&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;$++;$++; // $ === 3&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
In a similar fashion, strings can be created from strings embedded in the language. The boolean object true can be converted to string by concatenation, and then accessed by numeric index to, for example, produce the letter 'e'&amp;amp;nbsp;: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;â = (!''+'')[$] // â[$] === &amp;quot;true&amp;quot;[3] === e&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== Previous Similar Contest  ===&lt;br /&gt;
&lt;br /&gt;
These two techniques are behind a [http://sla.ckers.org/forum/read.php?24,28687 previous contest at the forum &amp;quot;sla.ckers.org&amp;quot;], where the contest was to create alert(1) with as few non-alphanumeric characters as possible. Currently, the code actually being executed was: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;([],&amp;quot;sort&amp;quot;)()[&amp;quot;alert&amp;quot;](1) // since ([],&amp;quot;sort&amp;quot;)()&amp;lt;/nowiki&amp;gt; leaks window object in FF, ==&amp;amp;gt; &amp;lt;nowiki&amp;gt;window[&amp;quot;alert&amp;quot;](1)&amp;lt;/nowiki&amp;gt; is called, which is another form of &amp;lt;nowiki&amp;gt;window.alert(1)&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The winner, or at least current leading entry is 84 bytes long, and looks like this: &lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;(Å='',[Į=!(ĩ=!Å+Å)+{}][Į[Š=ĩ[++Å]+ĩ[Å-Å],Č=Å-~Å]+Į[Č+Č]+Š])()[Į[Å]+Į[Å+Å]+ĩ[Č]+Š](Å)&amp;lt;/nowiki&amp;gt; &lt;br /&gt;
&lt;br /&gt;
=== The Challenge  ===&lt;br /&gt;
&lt;br /&gt;
August's challenge was to, in a similar fashion, create an alert(&amp;quot;owasp&amp;quot;), case-insensitive, not using any alphanumeric characters. The shortest working code snippet submitted by September 18th 23:59:59 [http://www.worldtimeserver.com/current_time_in_UTC.aspx UTC] won a free ticket. By &amp;quot;working&amp;quot; we meant JavaScript that executes in Firefox/Firebug, not depending on any Firebug DOM variables for execution. &lt;br /&gt;
&lt;br /&gt;
'''Submissions were made as comments to the [http://owaspsweden.blogspot.com/2009/08/appsec-research-2010-challenge-3.html challenge 3 blogpost on Owasp Sweden].''' Check it out. &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge 2: OWASP Crossword Puzzle (closed)  ==&lt;br /&gt;
&lt;br /&gt;
July's crossword challenge is over. Many permutations arrived in our inbox but it was tricky to get it completely right. Congratulations to Johannes Dahse and Johan Nilsson who in the end were allowed to join forces to be able to find the correct solution. They win a 50&amp;amp;nbsp;% conference ticket discount each. &lt;br /&gt;
&lt;br /&gt;
You find the solution below. &lt;br /&gt;
&lt;br /&gt;
[[Image:Appsec research 2010 challenge 2 solution.gif]] &lt;br /&gt;
&lt;br /&gt;
== AppSec Research Challenge 1: Input Validation and Regular Expressions (closed)  ==&lt;br /&gt;
&lt;br /&gt;
'''This challenge is over'''. The winner was Partik Nordlén. To see the solution(s), please visit the [https://lists.owasp.org/pipermail/appsec_eu_2010/2009-July/000000.html appsec_eu_2010 mailing list archive]. &lt;br /&gt;
&lt;br /&gt;
''Some people, when confronted with a problem, think “I know, I'll use regular expressions.” Now they have two problems.''&amp;lt;br&amp;gt; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; &amp;amp;nbsp; --Jamie Zawinski, in comp.emacs.xemacs &lt;br /&gt;
&lt;br /&gt;
The 21st of each month up until the conference in June 2010 we'll have a countdown challenge posted here. The winner each month will get a free entrance ticket worth about €300/$400. Be sure to sign up for [https://lists.owasp.org/mailman/listinfo/appsec_eu_2010 the conference mailing list] to get a monthly reminder. &lt;br /&gt;
&lt;br /&gt;
=== The Challenge  ===&lt;br /&gt;
&lt;br /&gt;
A community is hosted on a very large domain, yahoogle.com. The users of that community all have profiles, where they are allowed to use basic HTML for customization, as well as JavaScript files hosted on the domain. &lt;br /&gt;
&lt;br /&gt;
All the code for the profile pages are filtered on the server side, and whenever a piece of code containing &amp;quot;&amp;amp;lt;script...&amp;quot; is encountered, the following regular expression is used to validate that the script loaded is hosted on a subdomain of yahoogle.com: &lt;br /&gt;
&lt;br /&gt;
.*(&amp;amp;lt;script){1}([^&amp;amp;gt;]+)src=('http:\/\/[a-zA-Z]+.yahoogle.com\/scripts\/[0-9A-Za-z]+\.js').*\/&amp;amp;gt; &lt;br /&gt;
&lt;br /&gt;
Capture group 3 is then also checked against a whitelist of allowed scripts on that domain. The whitelist consists of &amp;quot;http://secure.yahoogle.com&amp;quot; and &amp;quot;http://scripts.yahoogle.com&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
Your task is to formulate a snippet of HTML that goes correctly through the filter and the whitelist, but loads the script &amp;quot;http://insecure.com/evil.js&amp;quot; instead. Also, rework the regular expression to defend against your &amp;quot;attack&amp;quot;. &lt;br /&gt;
&lt;br /&gt;
'''Email your solution to Martin Holst Swende &amp;amp;lt;martin.holst_swende@owasp.org&amp;amp;gt;'''. The first correct answer wins a free ticket to the conference. The free ticket is personal and the judgement of the organizing committee can not be overruled&amp;amp;nbsp;:). &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &amp;lt;headertabs /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.0.4_-_Assessment&amp;diff=80796</id>
		<title>Category:OWASP ModSecurity Core Rule Set Project - ModSecurity 2.0.4 - Assessment</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_ModSecurity_2.0.4_-_Assessment&amp;diff=80796"/>
				<updated>2010-03-31T14:39:02Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Stable Release Review of the OWASP ModSecurity Core Rule Set Project - Release ModSecurity 2.0.4 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&amp;lt;small&amp;gt;[[:Category:OWASP ModSecurity Core Rule Set Project|Click here to return to project's main page]]&amp;lt;/small&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Stable Release Review of the OWASP ModSecurity Core Rule Set Project - Release ModSecurity 2.0.4 ==&lt;br /&gt;
&lt;br /&gt;
==== Project Leader for this Release ====&lt;br /&gt;
'''''[[User:Rcbarnett|Ryan Barnett]]'s Pre-Assessment Checklist:'''''&lt;br /&gt;
&lt;br /&gt;
{{ Pre-Assessment Questions - Tools&lt;br /&gt;
| 1. Is this release associated with a project containing at least the [[Assessing_Project_Health#Project_Wiki_Page_Minimal_Content|Project Wiki Page Minimum Content]]  information?&lt;br /&gt;
= (answer #1) &lt;br /&gt;
   1. have an up to date project template with current project information? - YES&lt;br /&gt;
   2. have a conference style presentation that describes the tool/document in at least 3 slides? - YES&lt;br /&gt;
   3. have a one sheet overview document about the project? - NO&lt;br /&gt;
   4. have a link to a working mail list? - YES&lt;br /&gt;
   5. have a statement of the application security issue the project addresses? - YES&lt;br /&gt;
   6. have a project roadmap? - YES&lt;br /&gt;
   7. project leaders and main contributors have a wiki account (with its user page containing contact details about the user and if possible his CV) - YES&lt;br /&gt;
&lt;br /&gt;
| 2. Is your tool licensed under an open source license? &lt;br /&gt;
= (answer #2) &lt;br /&gt;
 http://www.gnu.org/licenses/old-licenses/gpl-2.0.html&lt;br /&gt;
&lt;br /&gt;
| 3. Is the source code and any documentation available in an online project repository? &lt;br /&gt;
= (answer #3)&lt;br /&gt;
 http://mod-security.svn.sourceforge.net/viewvc/mod-security/crs/&lt;br /&gt;
&lt;br /&gt;
| 4. Is there working code? &lt;br /&gt;
= (answer #4)&lt;br /&gt;
 http://sourceforge.net/projects/mod-security/files/modsecurity-crs/&lt;br /&gt;
&lt;br /&gt;
| 5. Is there a roadmap for this project release which will take it from Alpha to Stable release? &lt;br /&gt;
= (answer #5)&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project_-_Roadmap&lt;br /&gt;
&lt;br /&gt;
| 6. Are the Alpha pre-assessment items complete?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
 YES&lt;br /&gt;
&lt;br /&gt;
| 7. Is there an installer or stand-alone executable? &lt;br /&gt;
= (answer #7)&lt;br /&gt;
 Not applicable. CRS is not a standalone project that can be installed with an installer.&lt;br /&gt;
&lt;br /&gt;
| 8. Is there user documentation on the OWASP project wiki page? &lt;br /&gt;
= (answer #8)&lt;br /&gt;
 YES&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Installation&lt;br /&gt;
 http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Documentation&lt;br /&gt;
&lt;br /&gt;
| 9. Is there an &amp;quot;About box&amp;quot; or similar help item which lists the following? &lt;br /&gt;
= (answer #9)&lt;br /&gt;
 YES - http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project#tab=Project_Details&lt;br /&gt;
&lt;br /&gt;
 # Project Name - ModSecurity Core Rule Set (CRS)&lt;br /&gt;
 # Short Description - The Core Rule Set (CRS) provides critical protections against web attacks.  Unlike intrusion detection and prevention systems, which rely on signatures specific to known vulnerabilities, &lt;br /&gt;
                       the CRS is based on generic rules which focus on attack payload identification in order to provide protection from zero day and unknown vulnerabilities often found in web applications, &lt;br /&gt;
                       which are in most cases custom coded. &lt;br /&gt;
 # Project Release Lead and contact information (e.g. email address) - Ryan Barnett ryan.barnett@breach.com&lt;br /&gt;
 # Project Release Contributors (if any) - Brian Rectanus&lt;br /&gt;
 # Project Release License - GNU General Public License - Version 2.0&lt;br /&gt;
 # Project Release Sponsors (if any) - Breach Security Labs&lt;br /&gt;
 # Release status and date assessed as Month-Year (e.g. March 2009) - Not Yet Reviewed by OWASP.  An important point to consider is that the CRS is not the typical OWASP project.  Most projects start out as ideas, then move to documentation&lt;br /&gt;
                                                                      and eventually working code.  The CRS is in the opposite position in that Breach Security Labs developed these rules over the past 3-4 years.  So, we brought a project with&lt;br /&gt;
                                                                      fully working code that is running on thousands of web servers.  The code itself is well tested.  What was lacking was documentation which as since been updated.&lt;br /&gt;
 # Link to OWASP Project Page - http://www.owasp.org/index.php/Category:OWASP_ModSecurity_Core_Rule_Set_Project&lt;br /&gt;
&lt;br /&gt;
| 10. Is there documentation on how to build the tool from source including obtaining the source from the code repository? &lt;br /&gt;
= (answer #10)&lt;br /&gt;
 Not applicable, as no building is needed.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the tool documentation stored in the same repository as the source code?&lt;br /&gt;
= (answer #11)&lt;br /&gt;
 YES - there is also extensive new documentation/comments inside the files themselves describing the Rule Logic and Reference links.&lt;br /&gt;
&lt;br /&gt;
| 12. Are the Alpha and Beta pre-assessment items complete? &lt;br /&gt;
= (answer #12)&lt;br /&gt;
 YES&lt;br /&gt;
&lt;br /&gt;
| 13. Does the tool include documentation built into the tool? &lt;br /&gt;
= (answer #13) &lt;br /&gt;
 YES - there is also extensive new documentation/comments inside the files themselves describing the Rule Logic and Reference links.&lt;br /&gt;
&lt;br /&gt;
| 14. Does the tool include build scripts to automate builds? &lt;br /&gt;
= (answer #14)&lt;br /&gt;
 Not applicable, as no building is needed.&lt;br /&gt;
&lt;br /&gt;
| 15. Is there a publicly accessible bug tracking system? &lt;br /&gt;
= (answer #15)&lt;br /&gt;
 YES - JIRA Ticket System:&lt;br /&gt;
 https://www.modsecurity.org/tracker/browse/CORERULES &lt;br /&gt;
&lt;br /&gt;
| 16. Have any existing limitations of the tool been documented? &lt;br /&gt;
= (answer #15)&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== First Reviewer ====&lt;br /&gt;
'''''[[User:Ivanr|Ivan Ristic]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;Ideally, reviewers should be an existing OWASP project leader or chapter leader.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = Not applicable. ModSecurity rules cannot be installed with an installer.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= Not applicable. The rules do use the SecComponentSignature to identify themselves, which is the closest thing to having an “About box” in these circumstances.&lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= Not applicable. Building is not necessary as the rules are evaluated at runtime.&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= Yes.&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= Not applicable. No building is necessary.&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= The bug tracking system is very much usable. JIRA is pretty much the best tracking system available. It is hosted elsewhere, but that’s a big plus in this case (because the code is hosted at SourceForge, and its tracking systems are all bad.)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= No.&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= Yes. The Core Rules are a substantial piece of work that provides significant security qualities. Nothing similar is available elsewhere. It’s easily the best rule set there is.&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= I don’t believe anything else is required for a stable release. Of course, the rules can be improved, but that’s a matter of new research.&lt;br /&gt;
There are two areas in which I would like to see improvement:&lt;br /&gt;
• More involvement from the community. For the rules to flourish, there must be a sustained community involvement. Ryan is already very clear about leading the project into this direction (as demonstrated by his messages on the mailing list).&lt;br /&gt;
• Transparency. This is always a difficult goal to achieve with WAF rules. I would like to see clear justification of every rule in the set, explanation of the attack it was designed to handle, and explanation of the way in which it works.&lt;br /&gt;
In talking to Ryan, it is clear that there already are activities under way to address both of the above points.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
==== Second Reviewer ====&lt;br /&gt;
'''''[[User:Leocavallari|Leonardo Cavallari]]'s Review:'''''&amp;lt;br /&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;It is recommended that an OWASP board member or Global Projects Committee member be the second reviewer on Quality releases. The board has the initial option to review the project, followed by the Global Projects Committee.&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{{ Assessment Questions - Tools&lt;br /&gt;
&lt;br /&gt;
| 1. Is an installer for the tool available and easy to use? How close does it reach the goal of a fully automated installer?      = (answer #1) Delete this text and place your answer here. The same for the questions below.&lt;br /&gt;
&lt;br /&gt;
| 2. Is the end user documentation complete, relevant and presented on the OWASP wiki page?&lt;br /&gt;
= (answer #2) &lt;br /&gt;
&lt;br /&gt;
|3. Does the tool have an “About box” or similar help item which allows the end user to get an overview of the state of this tool? Is this information readily available and easy to find?&lt;br /&gt;
= (answer #3) &lt;br /&gt;
&lt;br /&gt;
| 4. Does the documentation on building the source provide the necessary information and detail to allow someone to build the tool? Is there sufficient detail and information for the target user? Is there any domain specific knowledge that is assumed and not provided?&lt;br /&gt;
= (answer #4)&lt;br /&gt;
&lt;br /&gt;
| 5. Is the tool's documentation available with the source code and would it readily discoverable by a new user of the tool?&lt;br /&gt;
= (answer #5)&lt;br /&gt;
&lt;br /&gt;
| 6. Is there anything missing that is critical enough to keep the release at a alpha quality?&lt;br /&gt;
= (answer #6)&lt;br /&gt;
&lt;br /&gt;
| 7. Does the tool substantially address the application security issues it was created to solve?&lt;br /&gt;
= (answer #7)&lt;br /&gt;
&lt;br /&gt;
| 8. Is the tool reasonably easy to use?&lt;br /&gt;
= (answer #8)&lt;br /&gt;
&lt;br /&gt;
| 9. Does the documentation meet the needs of the tool users and is easily found?&lt;br /&gt;
= (answer #9)&lt;br /&gt;
&lt;br /&gt;
| 10. Do the build scripts work as expected? Can you build the tool? The goal is a “One-click” build.&lt;br /&gt;
= (answer #10)&lt;br /&gt;
&lt;br /&gt;
| 11. Is the bug tracking system usable? Is it hosted at the same place as the source code? (e.g. Google Code, Sourceforge)&lt;br /&gt;
= (answer #11)&lt;br /&gt;
&lt;br /&gt;
| 12. Have you noted any limitations of the tool that are not already documented by the project lead.&lt;br /&gt;
= (answer #12)&lt;br /&gt;
&lt;br /&gt;
| 13. Would you consider using this tool in your day to day work assuming your professional work includes a reason to use this tool? Why or why not?&lt;br /&gt;
= (answer #13)&lt;br /&gt;
&lt;br /&gt;
| 14. What, if anything, is missing which would make this a more useful tool? Is what is missing critical enough to keep the release at a beta quality?&lt;br /&gt;
= (answer #14)&lt;br /&gt;
&lt;br /&gt;
}}&lt;br /&gt;
&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=76238</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=76238"/>
				<updated>2010-01-14T14:06:58Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Talks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Justin Clarke (justin.clarke [at] owasp.org) since January 2009|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;London&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
===Thursday, January 14th 2010===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Nomura, Nomura House, 1 St Martins-le-Grand, London EC1A 4NP &lt;br /&gt;
&lt;br /&gt;
====Talks====&lt;br /&gt;
&lt;br /&gt;
* '''Top Ten Deployment Mistakes That Render SSL Useless - Ivan Ristic''' ([http://ivanr.typepad.com/files/ivan_ristic-how_to_render_ssl_useless.pdf PDF])&lt;br /&gt;
*: SSL is the technology that secures the Internet, but it only works when properly configured. Unfortunately, because SSL is assumed to be easy to use (and it genuinely is), there is a lack of information how to use it properly. As a result, too many web sites use insecure deployment practices that render SSL completely useless. In this talk I will present a list of top ten (or thereabout) deployment mistakes, based on my work on the SSL Labs assessment platform.&lt;br /&gt;
&lt;br /&gt;
* '''Using Selenium to hold state for web application penetration testing - Yiannis Pavlosoglou'''	 &lt;br /&gt;
*: Selenium is a web application testing framework often used for unit testing and functional testing during the later parts of web application development. This presentation examines how this tool, in particular the [http://seleniumhq.org Selenium IDE], can be used for creating security unit tests. By emulating a systematic logon, logoff or browse to a particular location, web application penetration tests can be performed using Selenium. Furthermore, fuzzing payloads can be scripted as inputs for security tests. As a result, issues of holding state, or having valid authentication credentials to test a particular input for, say, Cross Site Scripting (XSS) or SQL Injection can be performed in a much shorter time duration. This presentation will take the audience through the process of setting up, scripting and running Selenium against a vulnerable web application. It's aim is to relay back one successful approach that has been used in the field in order to discover vulnerabilities through stateful fuzzing.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
* '''Ivan Ristic''' is a respected security expert and book author, known especially for his contribution to the web application firewall field and the development of ModSecurity, an open source web application firewall. He is the author of Apache Security, a comprehensive security guide for the Apache web server. A frequent speaker at computer security conferences, Ivan is an active participant in the application security community, member of the Open Web Application Security Project (OWASP) and officer of the Web Application Security Consortium (WASC).&lt;br /&gt;
* '''Yiannis Pavlosoglou'''. Coming from a solid academic background in information security, Yiannis has spent a number of years in industry, formerly with companies such as Verizon and Ounce Labs. He is the managing partner at Seleucus Ltd, based in London.&lt;br /&gt;
&lt;br /&gt;
====RSVP====&lt;br /&gt;
&lt;br /&gt;
If you are planning to attend you must RSVP at [http://owasp-london.eventbrite.com EventBrite]. Note, please enter your real name, as this will be given to Nomura building security. If you don't RSVP, you may not be let into the building. Also note that RSVPs close midday the day of the event (so we can get names on the door), so make sure you RSVP in advance.&lt;br /&gt;
&lt;br /&gt;
Also, if you are no longer able to attend, please email Justin at justin.clarke@owasp.org so your space can be released for someone else.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
===Thursday, March 11th 2010===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Nomura, Nomura House, 1 St Martins-le-Grand, London EC1A 4NP&lt;br /&gt;
&lt;br /&gt;
====Talks====&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
===Thursday, November 5th 2009===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Lloyds TSB, 5th Floor Seminar Room, Red Lion Court, 46-48 Park Street, London SE1 9EQ. &lt;br /&gt;
&lt;br /&gt;
*'''SQL Injection - How far does the rabbit hole go? - Justin Clarke''' ([[Media:OWASP-SQLInjection5nov09.pdf|PDF]])&lt;br /&gt;
*:SQL Injection has been around for over 10 years, and yet it is still to this day not truly understood by many security professionals and developers. With the recent mass attacks against sites across the world it has again come to the fore of vulnerabilities under the spotlight, however many consider it to only be a data access issue, or parameterized queries to be a panacea. This talk starts from what was demonstrated last year at Black Hat in Las Vegas, where a self propagating SQL Injection worm was demonstrated live on stage. Explore some of the deeper, darker areas of SQL Injection, hybrid attacks, and exploiting obscure database functionality.&lt;br /&gt;
&lt;br /&gt;
*'''The London OWASP Chapter: Where to next? - Justin Clarke'''&lt;br /&gt;
*:We have a enormous amount of web application security experience and knowhow in the London area, but the question is how can we tap that at OWASP? And what can we, or what should we do with that? This session will be an open discussion (to be continued later over a beer no doubt) to discuss where we want to go with OWASP London, with you (the participants) being able to share what you would like to get out of, and what you'd be willing to put into the OWASP London chapter. Justin will be facilitating the discussion, but planned topics include growth and outreach, management of the chapter (i.e. a chapter board?), and what we want to do with our meetings.&lt;br /&gt;
&lt;br /&gt;
===Thursday, September 3rd 2009===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Lloyds TSB, 5th Floor Seminar Room, Red Lion Court, 46-48 Park Street, London SE1 9EQ. &lt;br /&gt;
&lt;br /&gt;
*'''OWASP O2 Platform - Open Platform for automating application security knowledge and workflows - Dinis Cruz''' ([[Media:OWASP O2 Platform - London Chapter - 3rd Sep 2009.pdf|PDF]])&lt;br /&gt;
*:In this talk Dinis Cruz will show the open source toolkit O2 (Ounce Open) which is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code security reviews. The O2 toolkit (http://www.o2-ounceopen.com) uses the scanning engines from Ounce Labs, Microsoft's CAT.NET tool and FindBugs (with more engines to be added soon) and allows advanced filtering, manipulation and visualization of its findings. In the past, there has been a very healthy skepticism on the usability of Source Code analysis engines to find commonly found vulnerablities in real world applications. This presentation will show that with some creative and powerful tools, it IS possible to use O2 to discover those issues.&lt;br /&gt;
&lt;br /&gt;
*'''Using Surrogates to Protect from Application Data Breach - Dave Marsh''' ([[Media:Dave Marsh Tokenisation.pdf|PDF]])&lt;br /&gt;
*:Companies are being challenged to store Personal Identifiable Information (PII) data in increasingly more secure environments, and also to comply with increasing standards of data security, for instance Payment Card Industry’s Data Security Standard (PCI DSS). Because all systems that accept or use PII/CC data are considered “in scope” for compliance, there are very few ways to “cut corners” when seeking compliance, and at the same time maintain your current business model. &lt;br /&gt;
*:This session will present a concept and use of a new data security model, tokenization, which substitutes “data surrogates” for PII/CC numbers in systems throughout the enterprise, thus reducing scope for compliance and annual audits, as well as lowering the risk of a data breach. This session will cover: &lt;br /&gt;
*:# The value of a centralized data vault for PII/CC data &lt;br /&gt;
*:# How tokens act as data surrogates &lt;br /&gt;
*:# Using surrogates for masked data &lt;br /&gt;
*:# The importance of a one-to-one token/data relationship &lt;br /&gt;
*:# How tokens are generated, and &lt;br /&gt;
*:# The security benefits of centralized key management&lt;br /&gt;
&lt;br /&gt;
===Thursday, July 9th 2009===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Barclays, Rooms 42/43, One Churchill Place, London E14 5HP&lt;br /&gt;
&lt;br /&gt;
* '''Auditing C# Code - Ilja van Sprundel''' ([[Media:IOActive-OWASP-London-200907.pdf|PDF]])&lt;br /&gt;
*: In this presentation, Ilja van Sprundel, Principal Consultant at IOActive, will discuss reviewing C# code, specifically C# code used for ASP.NET. He will cover entrypoints, exit points, .NET input validators, corner cases of API's, integer rules, managed vs unmanaged code, the garbage collector, exception handling issues, XSS cases, SQL Injection bugs, XML handling issues and usage of Anti-XSS.&lt;br /&gt;
&lt;br /&gt;
* '''The Ultimate IDS Smackdown - How red vs. blue situations can influence more than one might assume - Mario Heiderich and Gareth Heyes''' ([[Media:The Ultimate IDS Smackdown.pdf|PDF]])&lt;br /&gt;
*: The talk is a vector and coding showdown between the lead dev of the PHPIDS and one of its most determined challengers trying and managing to break it wherever possible. Expect a bloody battle between security researchers and developers without limits, regular expression magic against code obfuscation excellence leading to an interesting result about vs-situations in software development and IT security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Thursday, May 21st 2009===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Barclays, Presentation Suite 2, One Churchill Place, London E14 5HP&lt;br /&gt;
&lt;br /&gt;
* '''Hash Cookies - A simple recipe - John Fitzpatrick''' ([[Media:Hash-cookies 2009-05-21.pdf|PDF]])&lt;br /&gt;
*: Hash cookies is a concept devised in concert with a couple of other guys whilst discussing an application test we were working on. The goal of hash cookies being to make session hijacking attempts infeasible through re-hashing the session cookie on future requests to the server.&lt;br /&gt;
*: The aim of this talk is to put across the concept of hash cookies and then have the audience don their ninja suits and break it. That way we can work towards a robust secure mechanism for securing sessions which, hopefully, hash cookies is a good solid step towards.&lt;br /&gt;
&lt;br /&gt;
* '''OWASP Google Hacking Project - Christian Heinrich''' ([[Media:Cmlh - OWASP Google Hacking Project - OWASP EU 2009 and OWASP London Chapter May 2009 Meeting - Post Update 22 May 2009.zip|PDF (zipped)]])&lt;br /&gt;
*: Two Proof of Concepts (PoC) used during the reconnaissance phase of a penetration test will be demonstrated: &lt;br /&gt;
*:# &amp;quot;TCP Input Text&amp;quot; extracts TCP Ports and Fully Qualified Domain Names (FQDN) from Google Search Results into a .csv file and individual shell scripts for nmap and netcat to provide assurance of a listening TCP service since the last crawl performed by the &amp;quot;GoogleBot&amp;quot;. &lt;br /&gt;
*:# &amp;quot;Download Indexed Cache&amp;quot; retrieves content indexed within the Google Cache and supports the &amp;quot;Search Engine Reconnaissance&amp;quot; section of the recently released OWASP Testing Guide v3.  During the demonstration of &amp;quot;Download Indexed Cache&amp;quot;, the superiority of this approach will be proven over lesser methodologies, such as &amp;quot;Google Hacking&amp;quot; and the associated Google Hacking Database (GHDB). &lt;br /&gt;
*: The impact of mitigating controls, such as &amp;lt;META&amp;gt; Tags and robots.txt, based on the recommendations within the &amp;quot;Spiders/Robots/Crawlers&amp;quot; section of the recently released OWASP Testing Guide v3, will be explained.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Thursday, March 12th 2009===&lt;br /&gt;
&lt;br /&gt;
'''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG&lt;br /&gt;
&lt;br /&gt;
* '''OWASP Global Industry Committee - Colin Watson''' ([[Media:Owasp-london-industry-committee-march-2009.pdf|PDF]])&lt;br /&gt;
*: The Global Industry Committee was one of six new OWASP committees created during the EU Summit in Portugal last year. Colin Watson will talk about the committee's aims, plan, how to get involved, who it has been engaging with and what else it has been doing in the first few months.&lt;br /&gt;
&lt;br /&gt;
* '''The Software Assurance Maturity Model - Introduction and a Use Case - Matt Bartoldus''' ([[Media:OpenSAMM.pdf|PDF]])&lt;br /&gt;
*: The OWASP CLASP Project has been going through modification to move more towards a maturity model. As a result, the Software Assurance Maturity Model (SAMM) project has been released in a beta version.  The goal is to &amp;quot;define a usable security framework with sequential, measurable goals that can be used by small, medium, and large organisations in any line of business that involves software development&amp;quot;.  This talk will introduce SAMM and give a brief overview of its contents. We will then discuss how SAMM is currently being used to measure the level of information security activities within an EU based financial organisation's development methodology and providing the framework for implementing such activities into their everyday development activities (SDLC).&lt;br /&gt;
&lt;br /&gt;
* '''SQL injection: Not only AND 1=1 - Bernardo Damele A. G.''' ([[Media:SQLinjectionNotOnly.pdf|PDF]])&lt;br /&gt;
*: The presentation will cover a quick preamble on SQL injection definition, sqlmap and its key features. It will then illustrate the details of common and uncommon problems and respective solutions with examples that a penetration tester or a SQL injection tool developer faces when he wants to take advantage of any kind of web application SQL injection flaw on real world web applications, for instance SQL injection in ORDER BY and LIMIT clauses, single entry UNION query SQL injection, blind SQL injection algorithm speed enhancements, specific web application technologies IDS bypasses and more.&lt;br /&gt;
&lt;br /&gt;
== Archived Events ==&lt;br /&gt;
&lt;br /&gt;
For events before 2009, see [[Archived OWASP London Events]]&lt;br /&gt;
&lt;br /&gt;
== Other Activities ==&lt;br /&gt;
&lt;br /&gt;
*'''March 2009 - Entry for Nominet Best Practice Challenge 2009'''&lt;br /&gt;
Open Web Application Security Project was nominated by OWASP London for the Best Security Initiative Award ([[Image:Nominet_best_practice_challenge_2009_owasp_entry.pdf]]) in the [http://www.nominet.org.uk/about/bestpracticechallenge/ Nominet Best Practice Challenge 2009].  Short-listed June 2009. Announcement due 2 July 2009.&lt;br /&gt;
&lt;br /&gt;
*'''16th October 2008 - COI Browser Standards for Public Websites'''&lt;br /&gt;
&lt;br /&gt;
The London and [[Scotland]] Chapters joint response to the Central Office of Information draft document on [http://www.coi.gov.uk/guidance.php?page=200 browser standards for public websites] (version 0.13) ([[Image:OWASP-COI-Browser-Standards.pdf]]).&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=76237</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=76237"/>
				<updated>2010-01-14T14:06:36Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Talks */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Justin Clarke (justin.clarke [at] owasp.org) since January 2009|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;London&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Next Meeting ==&lt;br /&gt;
&lt;br /&gt;
===Thursday, January 14th 2010===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Nomura, Nomura House, 1 St Martins-le-Grand, London EC1A 4NP &lt;br /&gt;
&lt;br /&gt;
====Talks====&lt;br /&gt;
&lt;br /&gt;
* '''Top Ten Deployment Mistakes That Render SSL Useless - Ivan Ristic''' [http://ivanr.typepad.com/files/ivan_ristic-how_to_render_ssl_useless.pdf PDF])&lt;br /&gt;
*: SSL is the technology that secures the Internet, but it only works when properly configured. Unfortunately, because SSL is assumed to be easy to use (and it genuinely is), there is a lack of information how to use it properly. As a result, too many web sites use insecure deployment practices that render SSL completely useless. In this talk I will present a list of top ten (or thereabout) deployment mistakes, based on my work on the SSL Labs assessment platform.&lt;br /&gt;
&lt;br /&gt;
* '''Using Selenium to hold state for web application penetration testing - Yiannis Pavlosoglou'''	 &lt;br /&gt;
*: Selenium is a web application testing framework often used for unit testing and functional testing during the later parts of web application development. This presentation examines how this tool, in particular the [http://seleniumhq.org Selenium IDE], can be used for creating security unit tests. By emulating a systematic logon, logoff or browse to a particular location, web application penetration tests can be performed using Selenium. Furthermore, fuzzing payloads can be scripted as inputs for security tests. As a result, issues of holding state, or having valid authentication credentials to test a particular input for, say, Cross Site Scripting (XSS) or SQL Injection can be performed in a much shorter time duration. This presentation will take the audience through the process of setting up, scripting and running Selenium against a vulnerable web application. It's aim is to relay back one successful approach that has been used in the field in order to discover vulnerabilities through stateful fuzzing.&lt;br /&gt;
&lt;br /&gt;
====Speakers====&lt;br /&gt;
&lt;br /&gt;
* '''Ivan Ristic''' is a respected security expert and book author, known especially for his contribution to the web application firewall field and the development of ModSecurity, an open source web application firewall. He is the author of Apache Security, a comprehensive security guide for the Apache web server. A frequent speaker at computer security conferences, Ivan is an active participant in the application security community, member of the Open Web Application Security Project (OWASP) and officer of the Web Application Security Consortium (WASC).&lt;br /&gt;
* '''Yiannis Pavlosoglou'''. Coming from a solid academic background in information security, Yiannis has spent a number of years in industry, formerly with companies such as Verizon and Ounce Labs. He is the managing partner at Seleucus Ltd, based in London.&lt;br /&gt;
&lt;br /&gt;
====RSVP====&lt;br /&gt;
&lt;br /&gt;
If you are planning to attend you must RSVP at [http://owasp-london.eventbrite.com EventBrite]. Note, please enter your real name, as this will be given to Nomura building security. If you don't RSVP, you may not be let into the building. Also note that RSVPs close midday the day of the event (so we can get names on the door), so make sure you RSVP in advance.&lt;br /&gt;
&lt;br /&gt;
Also, if you are no longer able to attend, please email Justin at justin.clarke@owasp.org so your space can be released for someone else.&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
===Thursday, March 11th 2010===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Nomura, Nomura House, 1 St Martins-le-Grand, London EC1A 4NP&lt;br /&gt;
&lt;br /&gt;
====Talks====&lt;br /&gt;
&lt;br /&gt;
TBD&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
===Thursday, November 5th 2009===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Lloyds TSB, 5th Floor Seminar Room, Red Lion Court, 46-48 Park Street, London SE1 9EQ. &lt;br /&gt;
&lt;br /&gt;
*'''SQL Injection - How far does the rabbit hole go? - Justin Clarke''' ([[Media:OWASP-SQLInjection5nov09.pdf|PDF]])&lt;br /&gt;
*:SQL Injection has been around for over 10 years, and yet it is still to this day not truly understood by many security professionals and developers. With the recent mass attacks against sites across the world it has again come to the fore of vulnerabilities under the spotlight, however many consider it to only be a data access issue, or parameterized queries to be a panacea. This talk starts from what was demonstrated last year at Black Hat in Las Vegas, where a self propagating SQL Injection worm was demonstrated live on stage. Explore some of the deeper, darker areas of SQL Injection, hybrid attacks, and exploiting obscure database functionality.&lt;br /&gt;
&lt;br /&gt;
*'''The London OWASP Chapter: Where to next? - Justin Clarke'''&lt;br /&gt;
*:We have a enormous amount of web application security experience and knowhow in the London area, but the question is how can we tap that at OWASP? And what can we, or what should we do with that? This session will be an open discussion (to be continued later over a beer no doubt) to discuss where we want to go with OWASP London, with you (the participants) being able to share what you would like to get out of, and what you'd be willing to put into the OWASP London chapter. Justin will be facilitating the discussion, but planned topics include growth and outreach, management of the chapter (i.e. a chapter board?), and what we want to do with our meetings.&lt;br /&gt;
&lt;br /&gt;
===Thursday, September 3rd 2009===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Lloyds TSB, 5th Floor Seminar Room, Red Lion Court, 46-48 Park Street, London SE1 9EQ. &lt;br /&gt;
&lt;br /&gt;
*'''OWASP O2 Platform - Open Platform for automating application security knowledge and workflows - Dinis Cruz''' ([[Media:OWASP O2 Platform - London Chapter - 3rd Sep 2009.pdf|PDF]])&lt;br /&gt;
*:In this talk Dinis Cruz will show the open source toolkit O2 (Ounce Open) which is specifically designed for developers and security consultants to be able to perform quick, effective and thorough source code security reviews. The O2 toolkit (http://www.o2-ounceopen.com) uses the scanning engines from Ounce Labs, Microsoft's CAT.NET tool and FindBugs (with more engines to be added soon) and allows advanced filtering, manipulation and visualization of its findings. In the past, there has been a very healthy skepticism on the usability of Source Code analysis engines to find commonly found vulnerablities in real world applications. This presentation will show that with some creative and powerful tools, it IS possible to use O2 to discover those issues.&lt;br /&gt;
&lt;br /&gt;
*'''Using Surrogates to Protect from Application Data Breach - Dave Marsh''' ([[Media:Dave Marsh Tokenisation.pdf|PDF]])&lt;br /&gt;
*:Companies are being challenged to store Personal Identifiable Information (PII) data in increasingly more secure environments, and also to comply with increasing standards of data security, for instance Payment Card Industry’s Data Security Standard (PCI DSS). Because all systems that accept or use PII/CC data are considered “in scope” for compliance, there are very few ways to “cut corners” when seeking compliance, and at the same time maintain your current business model. &lt;br /&gt;
*:This session will present a concept and use of a new data security model, tokenization, which substitutes “data surrogates” for PII/CC numbers in systems throughout the enterprise, thus reducing scope for compliance and annual audits, as well as lowering the risk of a data breach. This session will cover: &lt;br /&gt;
*:# The value of a centralized data vault for PII/CC data &lt;br /&gt;
*:# How tokens act as data surrogates &lt;br /&gt;
*:# Using surrogates for masked data &lt;br /&gt;
*:# The importance of a one-to-one token/data relationship &lt;br /&gt;
*:# How tokens are generated, and &lt;br /&gt;
*:# The security benefits of centralized key management&lt;br /&gt;
&lt;br /&gt;
===Thursday, July 9th 2009===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Barclays, Rooms 42/43, One Churchill Place, London E14 5HP&lt;br /&gt;
&lt;br /&gt;
* '''Auditing C# Code - Ilja van Sprundel''' ([[Media:IOActive-OWASP-London-200907.pdf|PDF]])&lt;br /&gt;
*: In this presentation, Ilja van Sprundel, Principal Consultant at IOActive, will discuss reviewing C# code, specifically C# code used for ASP.NET. He will cover entrypoints, exit points, .NET input validators, corner cases of API's, integer rules, managed vs unmanaged code, the garbage collector, exception handling issues, XSS cases, SQL Injection bugs, XML handling issues and usage of Anti-XSS.&lt;br /&gt;
&lt;br /&gt;
* '''The Ultimate IDS Smackdown - How red vs. blue situations can influence more than one might assume - Mario Heiderich and Gareth Heyes''' ([[Media:The Ultimate IDS Smackdown.pdf|PDF]])&lt;br /&gt;
*: The talk is a vector and coding showdown between the lead dev of the PHPIDS and one of its most determined challengers trying and managing to break it wherever possible. Expect a bloody battle between security researchers and developers without limits, regular expression magic against code obfuscation excellence leading to an interesting result about vs-situations in software development and IT security.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Thursday, May 21st 2009===&lt;br /&gt;
&lt;br /&gt;
'''Location''': Barclays, Presentation Suite 2, One Churchill Place, London E14 5HP&lt;br /&gt;
&lt;br /&gt;
* '''Hash Cookies - A simple recipe - John Fitzpatrick''' ([[Media:Hash-cookies 2009-05-21.pdf|PDF]])&lt;br /&gt;
*: Hash cookies is a concept devised in concert with a couple of other guys whilst discussing an application test we were working on. The goal of hash cookies being to make session hijacking attempts infeasible through re-hashing the session cookie on future requests to the server.&lt;br /&gt;
*: The aim of this talk is to put across the concept of hash cookies and then have the audience don their ninja suits and break it. That way we can work towards a robust secure mechanism for securing sessions which, hopefully, hash cookies is a good solid step towards.&lt;br /&gt;
&lt;br /&gt;
* '''OWASP Google Hacking Project - Christian Heinrich''' ([[Media:Cmlh - OWASP Google Hacking Project - OWASP EU 2009 and OWASP London Chapter May 2009 Meeting - Post Update 22 May 2009.zip|PDF (zipped)]])&lt;br /&gt;
*: Two Proof of Concepts (PoC) used during the reconnaissance phase of a penetration test will be demonstrated: &lt;br /&gt;
*:# &amp;quot;TCP Input Text&amp;quot; extracts TCP Ports and Fully Qualified Domain Names (FQDN) from Google Search Results into a .csv file and individual shell scripts for nmap and netcat to provide assurance of a listening TCP service since the last crawl performed by the &amp;quot;GoogleBot&amp;quot;. &lt;br /&gt;
*:# &amp;quot;Download Indexed Cache&amp;quot; retrieves content indexed within the Google Cache and supports the &amp;quot;Search Engine Reconnaissance&amp;quot; section of the recently released OWASP Testing Guide v3.  During the demonstration of &amp;quot;Download Indexed Cache&amp;quot;, the superiority of this approach will be proven over lesser methodologies, such as &amp;quot;Google Hacking&amp;quot; and the associated Google Hacking Database (GHDB). &lt;br /&gt;
*: The impact of mitigating controls, such as &amp;lt;META&amp;gt; Tags and robots.txt, based on the recommendations within the &amp;quot;Spiders/Robots/Crawlers&amp;quot; section of the recently released OWASP Testing Guide v3, will be explained.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Thursday, March 12th 2009===&lt;br /&gt;
&lt;br /&gt;
'''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG&lt;br /&gt;
&lt;br /&gt;
* '''OWASP Global Industry Committee - Colin Watson''' ([[Media:Owasp-london-industry-committee-march-2009.pdf|PDF]])&lt;br /&gt;
*: The Global Industry Committee was one of six new OWASP committees created during the EU Summit in Portugal last year. Colin Watson will talk about the committee's aims, plan, how to get involved, who it has been engaging with and what else it has been doing in the first few months.&lt;br /&gt;
&lt;br /&gt;
* '''The Software Assurance Maturity Model - Introduction and a Use Case - Matt Bartoldus''' ([[Media:OpenSAMM.pdf|PDF]])&lt;br /&gt;
*: The OWASP CLASP Project has been going through modification to move more towards a maturity model. As a result, the Software Assurance Maturity Model (SAMM) project has been released in a beta version.  The goal is to &amp;quot;define a usable security framework with sequential, measurable goals that can be used by small, medium, and large organisations in any line of business that involves software development&amp;quot;.  This talk will introduce SAMM and give a brief overview of its contents. We will then discuss how SAMM is currently being used to measure the level of information security activities within an EU based financial organisation's development methodology and providing the framework for implementing such activities into their everyday development activities (SDLC).&lt;br /&gt;
&lt;br /&gt;
* '''SQL injection: Not only AND 1=1 - Bernardo Damele A. G.''' ([[Media:SQLinjectionNotOnly.pdf|PDF]])&lt;br /&gt;
*: The presentation will cover a quick preamble on SQL injection definition, sqlmap and its key features. It will then illustrate the details of common and uncommon problems and respective solutions with examples that a penetration tester or a SQL injection tool developer faces when he wants to take advantage of any kind of web application SQL injection flaw on real world web applications, for instance SQL injection in ORDER BY and LIMIT clauses, single entry UNION query SQL injection, blind SQL injection algorithm speed enhancements, specific web application technologies IDS bypasses and more.&lt;br /&gt;
&lt;br /&gt;
== Archived Events ==&lt;br /&gt;
&lt;br /&gt;
For events before 2009, see [[Archived OWASP London Events]]&lt;br /&gt;
&lt;br /&gt;
== Other Activities ==&lt;br /&gt;
&lt;br /&gt;
*'''March 2009 - Entry for Nominet Best Practice Challenge 2009'''&lt;br /&gt;
Open Web Application Security Project was nominated by OWASP London for the Best Security Initiative Award ([[Image:Nominet_best_practice_challenge_2009_owasp_entry.pdf]]) in the [http://www.nominet.org.uk/about/bestpracticechallenge/ Nominet Best Practice Challenge 2009].  Short-listed June 2009. Announcement due 2 July 2009.&lt;br /&gt;
&lt;br /&gt;
*'''16th October 2008 - COI Browser Standards for Public Websites'''&lt;br /&gt;
&lt;br /&gt;
The London and [[Scotland]] Chapters joint response to the Central Office of Information draft document on [http://www.coi.gov.uk/guidance.php?page=200 browser standards for public websites] (version 0.13) ([[Image:OWASP-COI-Browser-Standards.pdf]]).&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=71355</id>
		<title>Phoenix/Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Phoenix/Tools&amp;diff=71355"/>
				<updated>2009-10-12T13:59:46Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* SSL certificate checking / scanning */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
&amp;lt;p&amp;gt;Please send comments or questions to the [https://lists.owasp.org/mailman/listinfo/owasp-phoenix Phoenix-OWASP mailing-list].&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==LiveCDs==&lt;br /&gt;
Monday, January 29, 2007  4:02 PM    828569600 AOC_Labrat-ALPHA-0010.iso - http://www.packetfocus.com/hackos/&amp;lt;br /&amp;gt;&lt;br /&gt;
DVL (Damn Vulnerable Linux) - http://www.damnvulnerablelinux.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Test sites / testing grounds==&lt;br /&gt;
SPI Dynamics (live) - http://zero.webappsecurity.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cenzic (live) - http://crackme.cenzic.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watchfire (live) - http://demo.testfire.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Acunetix (live) - http://testphp.acunetix.com/ http://testasp.acunetix.com http://testaspnet.acunetix.com&amp;lt;br /&amp;gt;&lt;br /&gt;
WebMaven / Buggy Bank - http://www.mavensecurity.com/webmaven&amp;lt;br /&amp;gt;&lt;br /&gt;
Foundstone SASS tools - http://www.foundstone.com/us/resources-free-tools.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Updated HackmeBank - http://www.o2-ounceopen.com/technical-info/2008/12/8/updated-version-of-hacmebank.html&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP WebGoat - http://www.owasp.org/index.php/OWASP_WebGoat_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
OWASP SiteGenerator - http://www.owasp.org/index.php/Owasp_SiteGenerator&amp;lt;br /&amp;gt;&lt;br /&gt;
Stanford SecuriBench - http://suif.stanford.edu/~livshits/securibench/&amp;lt;br /&amp;gt;&lt;br /&gt;
SecuriBench Micro - http://suif.stanford.edu/~livshits/work/securibench-micro/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP proxying / editing==&lt;br /&gt;
WebScarab - http://www.owasp.org/index.php/Category:OWASP_WebScarab_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp - http://www.portswigger.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Paros - http://www.parosproxy.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fiddler - http://www.fiddlertool.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Proxy Editor - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
Pantera - http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
Suru - http://www.sensepost.com/research/suru/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpedit (curses-based) - http://www.neutralbit.com/en/rd/httpedit/&amp;lt;br /&amp;gt;&lt;br /&gt;
Charles - http://www.xk72.com/charles/&amp;lt;br /&amp;gt;&lt;br /&gt;
Odysseus - http://www.bindshell.net/tools/odysseus&amp;lt;br /&amp;gt;&lt;br /&gt;
Burp, Paros, and WebScarab for Mac OS X - http://www.corsaire.com/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web-application scanning tool from `Network Security Tools'/O'Reilly - http://examples.oreilly.com/networkst/&amp;lt;br /&amp;gt;&lt;br /&gt;
JS Commander - http://jscmd.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Ratproxy - http://code.google.com/p/ratproxy/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSnake's XSS cheat sheet based-tools, webapp fuzzing, and encoding tools==&lt;br /&gt;
Wfuzz - http://www.edge-security.com/wfuzz.php&amp;lt;br /&amp;gt;&lt;br /&gt;
ProxMon - http://www.isecpartners.com/proxmon.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Wapiti - http://wapiti.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Grabber - http://rgaucher.info/beta/grabber/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSScan - http://darkcode.ath.cx/scanners/XSSscan.py&amp;lt;br /&amp;gt;&lt;br /&gt;
CAL9000 - http://www.owasp.org/index.php/Category:OWASP_CAL9000_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
HTMangLe - http://www.fishnetsecurity.com/Tools/HTMangLe/publish.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
JBroFuzz - http://sourceforge.net/projects/jbrofuzz&amp;lt;br /&amp;gt;&lt;br /&gt;
XSSFuzz - http://ha.ckers.org/blog/20060921/xssfuzz-released/&amp;lt;br /&amp;gt;&lt;br /&gt;
WhiteAcid's XSS Assistant - http://www.whiteacid.org/greasemonkey/&amp;lt;br /&amp;gt;&lt;br /&gt;
Overlong UTF - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] MielieTool (SensePost Research) - http://packetstormsecurity.org/UNIX/utilities/mielietools-v1.0.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
RegFuzzer: test your regular expression filter - http://rgaucher.info/b/index.php/post/2007/05/26/RegFuzzer%3A-Test-your-regular-expression-filter&amp;lt;br /&amp;gt;&lt;br /&gt;
screamingCobra - http://www.dachb0den.com/projects/screamingcobra.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SPIKE and SPIKE Proxy - http://immunitysec.com/resources-freesoftware.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
RFuzz - http://rfuzz.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
WebFuzz - http://www.codebreakers-journal.com/index.php?option=com_content&amp;amp;task=view&amp;amp;id=112&amp;amp;Itemid=99999999&amp;lt;br /&amp;gt;&lt;br /&gt;
TestMaker - http://www.pushtotest.com/Docs/downloads/features.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ASP Auditor - http://michaeldaw.org/projects/asp-auditor-v2/&amp;lt;br /&amp;gt;&lt;br /&gt;
WSTool - http://wstool.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Hack Control Center (WHCC) - http://ussysadmin.com/whcc/&amp;lt;br /&amp;gt;&lt;br /&gt;
Web Text Converter - http://www.microsoft.com/mspress/companion/0-7356-2187-X/&amp;lt;br /&amp;gt;&lt;br /&gt;
HackBar (Firefox Add-on) - https://addons.mozilla.org/firefox/3899/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Force Tools (NF-Tools, Firefox Add-on) - http://www.net-force.nl/library/downloads/&amp;lt;br /&amp;gt;&lt;br /&gt;
PostIntercepter (Greasemonkey script) - http://userscripts.org/scripts/show/743&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==HTTP general testing / fingerprinting==&lt;br /&gt;
Wbox: HTTP testing tool - http://hping.org/wbox/&amp;lt;br /&amp;gt;&lt;br /&gt;
ht://Check - http://htcheck.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mumsie - http://www.lurhq.com/tools/mumsie.html&amp;lt;br /&amp;gt;&lt;br /&gt;
WebInject - http://www.webinject.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Torture.pl Home Page - http://stein.cshl.org/~lstein/torture/&amp;lt;br /&amp;gt;&lt;br /&gt;
JoeDog's Seige - http://www.joedog.org/JoeDog/Siege/&amp;lt;br /&amp;gt;&lt;br /&gt;
OPEN-LABS: metoscan (http method testing) - http://www.open-labs.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-balancing detector - http://ge.mine.nu/lbd.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HMAP - http://ujeni.murkyroc.com/hmap/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-Square: httprint - http://net-square.com/httprint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Wpoison: http stress testing - http://wpoison.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: MSNPawn - http://net-square.com/msnpawn/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
hcraft: HTTP Vuln Request Crafter - http://druid.caughq.org/projects/hcraft/&amp;lt;br /&amp;gt;&lt;br /&gt;
rfp.labs: LibWhisker - http://www.wiretrip.net/rfp/lw.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Nikto - http://www.cirt.net/code/nikto.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
twill - http://twill.idyll.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
DirBuster - http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] DFF Scanner - http://security-net.biz/files/dff/DFF.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] The Elza project - http://packetstormsecurity.org/web/elza-1.4.7-beta.zip http://www.stoev.org/elza.html&amp;lt;br /&amp;gt;&lt;br /&gt;
HackerFox and Hacking Addons Bundled: Portable Firefox with web hacking addons bundled&lt;br /&gt;
- http://sf.net/projects/hackfox&lt;br /&gt;
&lt;br /&gt;
==Browser-based HTTP tampering / editing / replaying==&lt;br /&gt;
TamperIE - http://www.bayden.com/Other/&amp;lt;br /&amp;gt;&lt;br /&gt;
isr-form - http://www.infobyte.com.ar/developments.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Modify Headers (Firefox Add-on) - http://modifyheaders.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Tamper Data (Firefox Add-on) - http://tamperdata.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
UrlParams (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1290/&amp;lt;br /&amp;gt;&lt;br /&gt;
TestGen4Web (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1385/&amp;lt;br /&amp;gt;&lt;br /&gt;
DOM Inspector / Inspect This (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1806/ https://addons.mozilla.org/en-US/firefox/addon/1913/&amp;lt;br /&amp;gt;&lt;br /&gt;
LiveHTTPHeaders / Header Monitor (Firefox Add-on) - http://livehttpheaders.mozdev.org/ https://addons.mozilla.org/en-US/firefox/addon/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Cookie editing / poisoning==&lt;br /&gt;
[TGZ] stompy: session id tool - http://lcamtuf.coredump.cx/stompy.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
Add'N Edit Cookies (AnEC, Firefox Add-on) - http://addneditcookies.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieCuller (Firefox Add-on) - http://cookieculler.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookiePie (Firefox Add-on) - http://www.nektra.com/oss/firefox/extensions/cookiepie/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSpy - http://www.codeproject.com/shell/cookiespy.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookies Explorer - http://www.dutchduck.com/Features/Cookies.aspx&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Ajax and XHR scanning==&lt;br /&gt;
Sahi - http://sahi.co.in/&amp;lt;br /&amp;gt;&lt;br /&gt;
scRUBYt - http://scrubyt.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
jQuery - http://jquery.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
jquery-include - http://www.gnucitizen.org/projects/jquery-include&amp;lt;br /&amp;gt;&lt;br /&gt;
Sprajax - http://www.denimgroup.com/sprajax.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Watir - http://wtr.rubyforge.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watij - http://watij.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Watin - http://watin.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
RBNarcissus - http://idontsmoke.co.uk/2005/rbnarcissus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderTest (Spider Fuzz plugin) - http://blog.caboo.se/articles/2007/2/21/the-fabulous-spider-fuzz-plugin&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Inline Debugger (jasildbg) - http://jasildbg.googlepages.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug Lite - http://www.getfirebug.com/lite.html&amp;lt;br /&amp;gt;&lt;br /&gt;
firewaitr - http://code.google.com/p/firewatir/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==RSS extensions and caching==&lt;br /&gt;
LiveLines (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/324/&amp;lt;br /&amp;gt;&lt;br /&gt;
rss-cache - http://www.dubfire.net/chris/projects/rss-cache/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SQL injection scanning==&lt;br /&gt;
0x90.org: home of Absinthe, Mezcal, etc - http://0x90.org/releases.php&amp;lt;br /&amp;gt;&lt;br /&gt;
SQLiX - http://www.owasp.org/index.php/Category:OWASP_SQLiX_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlninja: a SQL Server injection and takover tool - http://sqlninja.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JustinClarke's SQL Brute - http://www.justinclarke.com/archives/2006/03/sqlbrute.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BobCat - http://www.northern-monkee.co.uk/projects/bobcat/bobcat.html&amp;lt;br /&amp;gt;&lt;br /&gt;
sqlmap - http://sqlmap.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Scully: SQL Server DB Front-End and Brute-Forcer - http://www.sensepost.com/research/scully/&amp;lt;br /&amp;gt;&lt;br /&gt;
FG-Injector - http://www.flowgate.net/?lang=en&amp;amp;seccion=herramientas&amp;lt;br /&amp;gt;&lt;br /&gt;
PRIAMOS - http://www.priamos-project.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application security malware, backdoors, and evil code==&lt;br /&gt;
W3AF: Web Application Attack and Audit Framework - http://w3af.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Jikto - http://busin3ss.name/jikto-in-the-wild/&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS Shell - http://ferruh.mavituna.com/article/?1338&amp;lt;br /&amp;gt;&lt;br /&gt;
XSS-Proxy - http://xss-proxy.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AttackAPI - http://www.gnucitizen.org/projects/attackapi/&amp;lt;br /&amp;gt;&lt;br /&gt;
FFsniFF - http://azurit.elbiahosting.sk/ffsniff/&amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyBlog's web-based junkyard - http://honeyblog.org/junkyard/web-based/&amp;lt;br /&amp;gt;&lt;br /&gt;
BeEF - http://www.bindshell.net/tools/beef/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firefox Extension Scanner (FEX) - http://www.gnucitizen.org/projects/fex/&amp;lt;br /&amp;gt;&lt;br /&gt;
What is my IP address? - http://reglos.de/myaddress/&amp;lt;br /&amp;gt;&lt;br /&gt;
xRumer: blogspam automation tool - http://www.botmaster.net/movies/XFull.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyJax - http://www.merchantos.com/makebeta/tools/spyjax/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasecarnaval - http://www.gnucitizen.org/projects/greasecarnaval&amp;lt;br /&amp;gt;&lt;br /&gt;
Technika - http://www.gnucitizen.org/projects/technika/&amp;lt;br /&amp;gt;&lt;br /&gt;
Load-AttackAPI bookmarklet - http://www.gnucitizen.org/projects/load-attackapi-bookmarklet&amp;lt;br /&amp;gt;&lt;br /&gt;
MD's Projects: JS port scanner, pinger, backdoors, etc - http://michaeldaw.org/my-projects/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application services that aid in web application security assessment==&lt;br /&gt;
Netcraft - http://www.netcraft.net&amp;lt;br /&amp;gt;&lt;br /&gt;
AboutURL - http://www.abouturl.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
The Scrutinizer - http://www.scrutinizethis.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
net.toolkit - http://clez.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSniff - http://www.serversniff.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Online Microsoft script decoder - http://www.greymagic.com/security/tools/decoder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Webmaster-Toolkit - http://www.webmaster-toolkit.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
myIPNeighbbors, et al - http://digg.com/security/MyIPNeighbors_Find_Out_Who_Else_is_Hosted_on_Your_Site_s_IP_Address&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP charset encoding - http://h4k.in/encoding&amp;lt;br /&amp;gt;&lt;br /&gt;
data: URL testcases - http://h4k.in/dataurl&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser-based security fuzzing / checking==&lt;br /&gt;
Zalewski's MangleMe - http://lcamtuf.coredump.cx/mangleme/mangle.cgi&amp;lt;br /&amp;gt;&lt;br /&gt;
hdm's tools: Hamachi, CSSDIE, DOM-Hanoi, AxMan - http://metasploit.com/users/hdm/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
Peach Fuzzer Framework - http://peachfuzz.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
TagBruteForcer - http://research.eeye.com/html/tools/RT20060801-3.html&amp;lt;br /&amp;gt;&lt;br /&gt;
PROTOS Test-Suite: c05-http-reply - http://www.ee.oulu.fi/research/ouspg/protos/testing/c05/http-reply/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
COMRaider - http://labs.idefense.com&amp;lt;br /&amp;gt;&lt;br /&gt;
bcheck - http://bcheck.scanit.be/bcheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Stop-Phishing: Projects page - http://www.indiana.edu/~phishing/?projects&amp;lt;br /&amp;gt;&lt;br /&gt;
LinkScanner - http://linkscanner.explabs.com/linkscanner/default.asp&amp;lt;br /&amp;gt;&lt;br /&gt;
BrowserCheck - http://www.heise-security.co.uk/services/browsercheck/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cross-browser Exploit Tests - http://www.jungsonnstudios.com/cool.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Stealing information using DNS pinning demo - http://www.jumperz.net/index.php?i=2&amp;amp;a=1&amp;amp;b=7&amp;lt;br /&amp;gt;&lt;br /&gt;
Javascript Website Login Checker - http://ha.ckers.org/weird/javascript-website-login-checker.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Mozilla Activex - http://www.iol.ie/~locka/mozilla/mozilla.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
Jungsonn's Black Dragon Project - http://blackdragon.jungsonnstudios.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mr. T (Master Recon Tool, includes Read Firefox Settings PoC) - http://ha.ckers.org/mr-t/&amp;lt;br /&amp;gt;&lt;br /&gt;
Vulnerable Adobe Plugin Detection For UXSS PoC - http://www.0x000000.com/?i=324&amp;lt;br /&amp;gt;&lt;br /&gt;
About Flash: is your flash up-to-date? - http://www.macromedia.com/software/flash/about/&amp;lt;br /&amp;gt;&lt;br /&gt;
Test your installation of Java software - http://java.com/en/download/installed.jsp?detect=jre&amp;amp;try=1&amp;lt;br /&amp;gt;&lt;br /&gt;
WebPageFingerprint - Light-weight Greasemonkey Fuzzer - http://userscripts.org/scripts/show/30285&lt;br /&gt;
&lt;br /&gt;
==PHP static analysis and file inclusion scanning==&lt;br /&gt;
PHP-SAT.org: Static analysis for PHP - http://www.program-transformation.org/PHP/&amp;lt;br /&amp;gt;&lt;br /&gt;
Unl0ck Research Team: tool for searching in google for include bugs - http://unl0ck.net/tools.php&amp;lt;br /&amp;gt;&lt;br /&gt;
FIS: File Inclusion Scanner - http://www.segfault.gr/index.php?cat_id=3&amp;amp;cont_id=25&amp;lt;br/&amp;gt;&lt;br /&gt;
PHPSecAudit - http://developer.spikesource.com/projects/phpsecaudit&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==PHP Defensive Tools==&lt;br /&gt;
&lt;br /&gt;
PHPInfoSec - Check phpinfo configuration for security - http://phpsec.org/projects/phpsecinfo/&lt;br /&gt;
&lt;br /&gt;
A Greasemonkey Replacement can be found at http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Php-Brute-Force-Attack Detector - Detect your web servers being scanned by brute force tools such as WFuzz, OWASP DirBuster and vulnerability scanners such as Nessus, Nikto, Acunetix ..etc. &lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/php_brute_force_detect.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHP-Login-Info-Checker - Strictly enforce admins/users to select stronger passwords. It tests cracking passwords against 4 rules. It has also built-in smoke test page via url loginfo_checker.php?testlic&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/loginfo_checkerv0.1.zip&lt;br /&gt;
&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phploginfo_checker_demo.zip&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
php-DDOS-Shield - A tricky script to prevent idiot distributed bots which discontinue their flooding attacks by identifying HTTP 503 header code. http://code.google.com/p/ddos-shield/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
PHPMySpamFIGHTER - http://yehg.net/lab/pr0js/files.php/phpmyspamfighter.zip&lt;br /&gt;
http://yehg.net/lab/pr0js/files.php/phpMySpamFighter_demo.rar&lt;br /&gt;
&lt;br /&gt;
==Web Application Firewall (WAF) and Intrusion Detection (APIDS) rules and resources==&lt;br /&gt;
APIDS on Wikipedia - http://en.wikipedia.org/wiki/APIDS&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP Intrusion Detection System (PHP-IDS) - http://php-ids.org/ http://code.google.com/p/phpids/&amp;lt;br /&amp;gt;&lt;br /&gt;
dotnetids - http://code.google.com/p/dotnetids/&amp;lt;br /&amp;gt;&lt;br /&gt;
Secure Science InterScout - http://www.securescience.com/home/newsandevents/news/interscout1.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Remo: whitelist rule editor for mod_security - http://remo.netnea.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
GotRoot: ModSecuirty rules - http://www.gotroot.com/tiki-index.php?page=mod_security+rules&amp;lt;br /&amp;gt;&lt;br /&gt;
The Web Security Gateway (WSGW) - http://wsgw.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
mod_security rules generator - http://noeljackson.com/tools/modsecurity/&amp;lt;br /&amp;gt;&lt;br /&gt;
Mod_Anti_Tamper - http://www.wisec.it/projects.php?id=3&amp;lt;br /&amp;gt;&lt;br /&gt;
[TGZ] Automatic Rules Generation for Mod_Security - http://www.wisec.it/rdr.php?fn=/Projects/Rule-o-matic.tgz&amp;lt;br /&amp;gt;&lt;br /&gt;
AQTRONIX WebKnight - http://www.aqtronix.com/?PageID=99&amp;lt;br /&amp;gt;&lt;br /&gt;
Akismet: blog spam defense - http://akismet.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Samoa: Formal tools for securing web services - http://research.microsoft.com/projects/samoa/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web services enumeration / scanning / fuzzing==&lt;br /&gt;
WebServiceStudio2.0 - http://www.codeplex.com/WebserviceStudio&amp;lt;br /&amp;gt;&lt;br /&gt;
Net-square: wsChess - http://net-square.com/wschess/index.shtml&amp;lt;br /&amp;gt;&lt;br /&gt;
WSFuzzer - http://www.owasp.org/index.php/Category:OWASP_WSFuzzer_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
SIFT: web method search tool - http://www.sift.com.au/73/171/sift-web-method-search-tool.htm&amp;lt;br /&amp;gt;&lt;br /&gt;
iSecPartners: WSMap, WSBang, etc - http://www.isecpartners.com/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Web application non-specific static source-code analysis==&lt;br /&gt;
Pixy: a static analysis tool for detecting XSS vulnerabilities - http://www.seclab.tuwien.ac.at/projects/pixy/&amp;lt;br /&amp;gt;&lt;br /&gt;
Brixoft.Net: Source Edit - http://www.brixoft.net/prodinfo.asp?id=1&amp;lt;br /&amp;gt;&lt;br /&gt;
Security compass web application auditing tools (SWAAT) - http://www.owasp.org/index.php/Category:OWASP_SWAAT_Project&amp;lt;br /&amp;gt;&lt;br /&gt;
An even more complete list here - http://www.cs.cmu.edu/~aldrich/courses/654/tools/&amp;lt;br /&amp;gt;&lt;br /&gt;
A nice list that claims some demos available - http://www.cs.cmu.edu/~aldrich/courses/413/tools.html&amp;lt;br /&amp;gt;&lt;br /&gt;
A smaller, but also good list - http://spinroot.com/static/&amp;lt;br /&amp;gt;&lt;br /&gt;
Yasca: A highly extensible source code analysis framework; incorporates several analysis tools into one package. http://www.yasca.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Static analysis for C/C++ (CGI, ISAPI, etc) in web applications==&lt;br /&gt;
RATS - http://www.securesoftware.com/resources/download_rats.html&amp;lt;br /&amp;gt;&lt;br /&gt;
ITS4 - http://www.cigital.com/its4/&amp;lt;br /&amp;gt;&lt;br /&gt;
FlawFinder - http://www.dwheeler.com/flawfinder/&amp;lt;br /&amp;gt;&lt;br /&gt;
Splint - http://www.splint.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Uno - http://spinroot.com/uno/&amp;lt;br /&amp;gt;&lt;br /&gt;
BOON (Buffer Overrun detectiON) - http://www.cs.berkeley.edu/~daw/boon/ http://boon.sourceforge.net&amp;lt;br /&amp;gt;&lt;br /&gt;
Valgrind - http://www.valgrind.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Java static analysis, security frameworks, and web application security tools==&lt;br /&gt;
LAPSE - http://suif.stanford.edu/~livshits/work/lapse/ &amp;lt;br/&amp;gt;&lt;br /&gt;
HDIV Struts - http://hdiv.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Orizon - http://sourceforge.net/projects/orizon/&amp;lt;br /&amp;gt;&lt;br /&gt;
FindBugs: Find bugs in Java programs - http://findbugs.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PMD - http://pmd.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
CUTE: A Concolic Unit Testing Engine for C and Java - http://osl.cs.uiuc.edu/~ksen/cute/&amp;lt;br /&amp;gt;&lt;br /&gt;
EMMA - http://emma.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
JLint - http://jlint.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java PathFinder - http://javapathfinder.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Fujaba: Move between UML and Java source code - http://wwwcs.uni-paderborn.de/cs/fujaba/&amp;lt;br /&amp;gt;&lt;br /&gt;
Checkstyle - http://checkstyle.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Cookie Revolver Security Framework - http://sourceforge.net/projects/cookie-revolver&amp;lt;br /&amp;gt;&lt;br /&gt;
tinapoc - http://sourceforge.net/projects/tinapoc&amp;lt;br /&amp;gt;&lt;br /&gt;
jarsigner - http://java.sun.com/j2se/1.5.0/docs/tooldocs/solaris/jarsigner.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Solex - http://solex.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Java Explorer - http://metal.hurlant.com/jexplore/&amp;lt;br /&amp;gt;&lt;br /&gt;
HTTPClient - http://www.innovation.ch/java/HTTPClient/&amp;lt;br /&amp;gt;&lt;br /&gt;
another HttpClient - http://jakarta.apache.org/commons/httpclient/&amp;lt;br /&amp;gt;&lt;br /&gt;
a list of code coverage and analysis tools for Java - http://mythinkpond.blogspot.com/2007/06/java-foss-freeopen-source-software.html&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Microsoft .NET static analysis and security framework tools, mostly for ASP.NET and ASP.NET AJAX, but also C# and VB.NET==&lt;br /&gt;
* Visual Studio 2008 Code Analysis, available in:&lt;br /&gt;
** VSTS 2008 Development Edition (http://msdn.microsoft.com/vsts2008/products/bb933752.aspx) and &lt;br /&gt;
** VSTS 2008 Team Suite (http://msdn.microsoft.com/vsts2008/products/bb933735.aspx)&lt;br /&gt;
* Visual Studio 2005 Code Analyzer, available in:&lt;br /&gt;
** Visual Studio 2005 Team Edition for Software Developers  (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
** Visual Studio 2005 Team Suite (http://msdn.microsoft.com/en-us/vstudio/aa718806.aspx)&lt;br /&gt;
* Web Development Helper - http://www.nikhilk.net/Project.WebDevHelper.aspx&lt;br /&gt;
* FxCop:&lt;br /&gt;
** (blog) http://blogs.msdn.com/fxcop/&lt;br /&gt;
** (download) http://code.msdn.microsoft.com/codeanalysis&lt;br /&gt;
* Microsoft internal tools you can't have yet:&lt;br /&gt;
** http://www.microsoft.com/windows/cse/pa_projects.mspx &lt;br /&gt;
** http://research.microsoft.com/Pex/ &lt;br /&gt;
** http://www.owasp.org/images/5/5b/OWASP_IL_7_FuzzGuru.pdf&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Threat modeling==&lt;br /&gt;
Microsoft Threat Analysis and Modeling Tool v2.1 (TAM) - http://www.microsoft.com/downloads/details.aspx?FamilyID=59888078-9daf-4e96-b7d1-944703479451&amp;amp;displaylang=en&amp;lt;br /&amp;gt;&lt;br /&gt;
Amenaza: Attack Tree Modeling (SecurITree) - http://www.amenaza.com/software.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Octotrike - http://www.octotrike.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with general web application security==&lt;br /&gt;
Web Developer Toolbar - https://addons.mozilla.org/firefox/60/&amp;lt;br /&amp;gt;&lt;br /&gt;
Plain Old Webserver (POW) - https://addons.mozilla.org/firefox/3002/&amp;lt;br /&amp;gt;&lt;br /&gt;
XML Developer Toolbar - https://addons.mozilla.org/firefox/2897/&amp;lt;br /&amp;gt;&lt;br /&gt;
Public Fox - https://addons.mozilla.org/firefox/3911/&amp;lt;br /&amp;gt;&lt;br /&gt;
XForms Buddy - http://beaufour.dk/index.php?sec=misc&amp;amp;pagename=xforms&amp;lt;br /&amp;gt;&lt;br /&gt;
MR Tech Local Install - http://www.mrtech.com/extensions/local_install/&amp;lt;br /&amp;gt;&lt;br /&gt;
Nightly Tester Tools - http://users.blueprintit.co.uk/~dave/web/firefox/buildid/index.html&amp;lt;br /&amp;gt;&lt;br /&gt;
IE Tab - https://addons.mozilla.org/firefox/1419/&amp;lt;br /&amp;gt;&lt;br /&gt;
User-Agent Switcher - https://addons.mozilla.org/firefox/59/&amp;lt;br /&amp;gt;&lt;br /&gt;
ServerSwitcher - https://addons.mozilla.org/firefox/2409/&amp;lt;br /&amp;gt;&lt;br /&gt;
HeaderMonitor - https://addons.mozilla.org/firefox/575/&amp;lt;br /&amp;gt;&lt;br /&gt;
RefControl - https://addons.mozilla.org/firefox/953/&amp;lt;br /&amp;gt;&lt;br /&gt;
refspoof - https://addons.mozilla.org/firefox/667/&amp;lt;br /&amp;gt;&lt;br /&gt;
No-Referrer - https://addons.mozilla.org/firefox/1999/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocationBar^2 - https://addons.mozilla.org/firefox/4014/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpiderZilla - http://spiderzilla.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Slogger - https://addons.mozilla.org/en-US/firefox/addon/143&amp;lt;br /&amp;gt;&lt;br /&gt;
Fire Encrypter - https://addons.mozilla.org/firefox/3208/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Add-ons for Firefox that help with Javascript and Ajax web application security==&lt;br /&gt;
Selenium IDE - http://www.openqa.org/selenium-ide/&amp;lt;br /&amp;gt;&lt;br /&gt;
Firebug - http://www.joehewitt.com/software/firebug/&amp;lt;br /&amp;gt;&lt;br /&gt;
Venkman - http://www.mozilla.org/projects/venkman/&amp;lt;br /&amp;gt;&lt;br /&gt;
Chickenfoot - http://groups.csail.mit.edu/uid/chickenfoot/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey - http://www.greasespot.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey compiler - http://www.letitblog.com/greasemonkey-compiler/&amp;lt;br /&amp;gt;&lt;br /&gt;
User script compiler - http://arantius.com/misc/greasemonkey/script-compiler&amp;lt;br /&amp;gt;&lt;br /&gt;
Extension Developer's Extension (Firefox Add-on) - http://ted.mielczarek.org/code/mozilla/extensiondev/&amp;lt;br /&amp;gt;&lt;br /&gt;
Smart Middle Click (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/3885/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Bookmarklets that aid in web application security==&lt;br /&gt;
RSnake's security bookmarklets - http://ha.ckers.org/bookmarklets.html&amp;lt;br /&amp;gt;&lt;br /&gt;
BMlets - http://optools.awardspace.com/bmlet.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Huge list of bookmarklets - http://www.squarefree.com/bookmarklets/&amp;lt;br /&amp;gt;&lt;br /&gt;
Blummy: consists of small widgets, called blummlets, which make use of Javascript to provide&lt;br /&gt;
rich functionality - http://www.blummy.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
Bookmarklets every blogger should have - http://www.micropersuasion.com/2005/10/bookmarklets_ev.html&amp;lt;br /&amp;gt;&lt;br /&gt;
Flat Bookmark Editing (Firefox Add-on) - http://n01se.net/chouser/proj/mozhack/&amp;lt;br /&amp;gt;&lt;br /&gt;
OpenBook and Update Bookmark (Firefox Add-ons) - http://www.chuonthis.com/extensions/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==SSL certificate checking / scanning==&lt;br /&gt;
SSL Labs - https://www.ssllabs.com/ssldb/&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] THCSSLCheck - http://thc.org/root/tools/THCSSLCheck.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
[ZIP] Foundstone SSLDigger - http://www.foundstone.com/us/resources/termsofuse.asp?file=ssldigger.zip&amp;lt;br /&amp;gt;&lt;br /&gt;
Cert Viewer Plus (Firefox Add-on) - https://addons.mozilla.org/firefox/1964/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Honeyclients, Web Application, and Web Proxy honeypots==&lt;br /&gt;
Honeyclient Project: an open-source honeyclient - http://www.honeyclient.org/trac/ &amp;lt;br /&amp;gt;&lt;br /&gt;
HoneyC: the low-interaction honeyclient - http://honeyc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Capture: a high-interaction honeyclient - http://capture-hpc.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
Google Hack Honeypot - http://ghh.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
PHP.Hop - PHP Honeynet Project - http://www.rstack.org/phphop/&amp;lt;br /&amp;gt;&lt;br /&gt;
SpyBye - http://www.monkey.org/~provos/spybye/&amp;lt;br /&amp;gt;&lt;br /&gt;
Honeytokens - http://www.securityfocus.com/infocus/1713&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Blackhat SEO and maybe some whitehat SEO==&lt;br /&gt;
SearchStatus (Firefox Add-on) - http://www.quirk.biz/searchstatus/&amp;lt;br /&amp;gt;&lt;br /&gt;
SEO for Firefox (Firefox Add-on) - http://tools.seobook.com/firefox/seo-for-firefox.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SEOQuake (Firefox Add-on) - http://www.seoquake.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Footprinting for web application security==&lt;br /&gt;
Evolution - http://www.paterva.com/evolution-e.html&amp;lt;br /&amp;gt;&lt;br /&gt;
GooSweep - http://www.mcgrewsecurity.com/projects/goosweep/&amp;lt;br /&amp;gt;&lt;br /&gt;
Aura: Google API Utility Tools - http://www.sensepost.com/research/aura/&amp;lt;br /&amp;gt;&lt;br /&gt;
Edge-Security tools - http://www.edge-security.com/soft.php&amp;lt;br /&amp;gt;&lt;br /&gt;
Fierce Domain Scanner - http://ha.ckers.org/fierce/&amp;lt;br /&amp;gt;&lt;br /&gt;
Googlegath - http://www.nothink.org/perl/googlegath/&amp;lt;br /&amp;gt;&lt;br /&gt;
Advanced Dork (Firefox Add-on) - https://addons.mozilla.org/firefox/2144/&amp;lt;br /&amp;gt;&lt;br /&gt;
Passive Cache (Firefox Add-on) - https://addons.mozilla.org/firefox/977/&amp;lt;br /&amp;gt;&lt;br /&gt;
CacheOut! (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1453/&amp;lt;br /&amp;gt;&lt;br /&gt;
BugMeNot Extension (Firefox Add-on) - http://roachfiend.com/archives/2005/02/07/bugmenot/&amp;lt;br /&amp;gt;&lt;br /&gt;
TrashMail.net Extension (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1813/&amp;lt;br /&amp;gt;&lt;br /&gt;
DiggiDig (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2819/&amp;lt;br /&amp;gt;&lt;br /&gt;
Digger (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1467/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Database security assessment==&lt;br /&gt;
Scuba by Imperva Database Vulnerability Scanner - http://www.imperva.com/scuba/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Browser Defenses==&lt;br /&gt;
DieHard - http://www.diehard-software.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
LocalRodeo (Firefox Add-on) - http://databasement.net/labs/localrodeo/&amp;lt;br /&amp;gt;&lt;br /&gt;
NoMoXSS - http://www.seclab.tuwien.ac.at/projects/jstaint/&amp;lt;br /&amp;gt;&lt;br /&gt;
Request Rodeo - http://savannah.nongnu.org/projects/requestrodeo&amp;lt;br /&amp;gt;&lt;br /&gt;
FlashBlock (Firefox Add-on) - http://flashblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
CookieSafe (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2497&amp;lt;br /&amp;gt;&lt;br /&gt;
NoScript (Firefox Add-on) - http://www.noscript.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
FormFox (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1579/&amp;lt;br /&amp;gt;&lt;br /&gt;
Adblock (Firefox Add-on) - http://adblock.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
httpOnly in Firefox (Firefox Add-on) - http://blog.php-security.org/archives/40-httpOnly-Cookies-in-Firefox-2.0.html&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeCache (Firefox Add-on) - http://www.safecache.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
SafeHistory (Firefox Add-on) - http://www.safehistory.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
PrefBar (Firefox Add-on) - http://prefbar.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
All-in-One Sidebar (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/1027/&amp;lt;br /&amp;gt;&lt;br /&gt;
QArchive.org web file checker (Firefox Add-on) - https://addons.mozilla.org/firefox/4115/&amp;lt;br /&amp;gt;&lt;br /&gt;
Update Notified (Firefox Add-on) - https://addons.mozilla.org/en-US/firefox/addon/2098/&amp;lt;br /&amp;gt;&lt;br /&gt;
FireKeeper - http://firekeeper.mozdev.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
Greasemonkey: XSS Malware Script Detector - http://yehg.net/lab/#tools.greasemonkey&lt;br /&gt;
&lt;br /&gt;
==Browser Privacy==&lt;br /&gt;
TrackMeNot (Firefox Add-on) - https://addons.mozilla.org/firefox/3173/&amp;lt;br /&amp;gt;&lt;br /&gt;
Privacy Bird - http://www.privacybird.com/&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Application and protocol fuzzing (random instead of targeted)==&lt;br /&gt;
Sulley - http://fuzzing.org/&amp;lt;br /&amp;gt;&lt;br /&gt;
taof: The Art of Fuzzing - http://sourceforge.net/projects/taof/&amp;lt;br /&amp;gt;&lt;br /&gt;
zzuf: multipurpose fuzzer - http://sam.zoy.org/zzuf/&amp;lt;br /&amp;gt;&lt;br /&gt;
autodafé: an act of software torture - http://autodafe.sourceforge.net/&amp;lt;br /&amp;gt;&lt;br /&gt;
EFS and GPF: Evolutionary Fuzzing System - http://www.appliedsec.com/resources.html&amp;lt;br /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_1&amp;diff=50938</id>
		<title>Global Industry Committee - Application 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_1&amp;diff=50938"/>
				<updated>2009-01-12T17:28:11Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Colin Watson&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* EU Summit 08 - OWASP Awards working session chair&lt;br /&gt;
* EU Summit 08 - Event organisational assistance&lt;br /&gt;
* Coordination of OWASP UK chapters' response ([[London#Other_Activities]]) to the UK's Central Office of Information draft document on browser standards for public websites&lt;br /&gt;
* Participation in nomination of [http://www.nominet.org.uk/news/latest/2008/?contentId=5147 OWASP for Nominet Best Practice Awards 2008]&lt;br /&gt;
* Speaker at OWASP London chapter meeting&lt;br /&gt;
* Individual member&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Global Industry Committee.&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Eduardo V. C. Neves&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Positive Security Project Leader and Education Global Committee Member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin is hands on professional which is able to make thinks done very quickly and in a high  quality fashion. I believe that he will be a great member for this committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| David Rook&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| OWASP Code Review Guide Contributor, OWASP Ireland Contributor&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin has the drive and knowledge to lead OWASP efforts at the committee level. He has excellent knowledge across many security areas and a professional positive attitude towards helping people understand and embrace information security. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Paulo Coimbra&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Project Manager&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin Watson was one of the OWASP Summit co-organizers. To me, his performance was absolutely outstanding. His calm reliability can be a valuable asset. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| David Campbell&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Industry Committee Member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin was instrumental in organizing the Portugal Summit, and provided much valuable input to the Intra Gov't affairs working group.  He will be a great asset to the Industry committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Rex Booth&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Industry Committee Member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin has been an active participant in the Industry Committee since its inception in Portugal.  He absolutely deserves to be an official member and we could certainly use his assistance!&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''6'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Mano Paul&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Global Education Committee Chair&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin was extremely helpful with all his voluntary helpful to make the OWASP EU summit at Portugal, a success. My interactions with him left me in respect of him for his background and experience and in what he has to offer to OWASP. I can vouch confidently that his official involvement in the Industry Committee will undoubtedly reflect positively on OWASP and you consideration would be appreciated. Highly recommend. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''7'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Ivan Ristic&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Former OWASP London Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin is not only a regular visitor of OWASP London meetings, but someone who's willing to lend a hand when help is needed. He strikes me as a person who can be relied upon to do the right thing. &lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_1&amp;diff=50937</id>
		<title>Global Industry Committee - Application 1</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Industry_Committee_-_Application_1&amp;diff=50937"/>
				<updated>2009-01-12T17:27:48Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Colin Watson&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
* EU Summit 08 - OWASP Awards working session chair&lt;br /&gt;
* EU Summit 08 - Event organisational assistance&lt;br /&gt;
* Coordination of OWASP UK chapters' response ([[London#Other_Activities]]) to the UK's Central Office of Information draft document on browser standards for public websites&lt;br /&gt;
* Participation in nomination of [http://www.nominet.org.uk/news/latest/2008/?contentId=5147 OWASP for Nominet Best Practice Awards 2008]&lt;br /&gt;
* Speaker at OWASP London chapter meeting&lt;br /&gt;
* Individual member&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Global Industry Committee.&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Eduardo V. C. Neves&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Positive Security Project Leader and Education Global Committee Member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin is hands on professional which is able to make thinks done very quickly and in a high  quality fashion. I believe that he will be a great member for this committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| David Rook&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| OWASP Code Review Guide Contributor, OWASP Ireland Contributor&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin has the drive and knowledge to lead OWASP efforts at the committee level. He has excellent knowledge across many security areas and a professional positive attitude towards helping people understand and embrace information security. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Paulo Coimbra&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Project Manager&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin Watson was one of the OWASP Summit co-organizers. To me, his performance was absolutely outstanding. His calm reliability can be a valuable asset. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| David Campbell&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Industry Committee Member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin was instrumental in organizing the Portugal Summit, and provided much valuable input to the Intra Gov't affairs working group.  He will be a great asset to the Industry committee.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Rex Booth&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Industry Committee Member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin has been an active participant in the Industry Committee since its inception in Portugal.  He absolutely deserves to be an official member and we could certainly use his assistance!&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''6'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Mano Paul&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Global Education Committee Chair&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;| Colin was extremely helpful with all his voluntary helpful to make the OWASP EU summit at Portugal, a success. My interactions with him left me in respect of him for his background and experience and in what he has to offer to OWASP. I can vouch confidently that his official involvement in the Industry Committee will undoubtedly reflect positively on OWASP and you consideration would be appreciated. Highly recommend. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''7'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Ivan Ristic&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Former OWASP London Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;| Colin is not only a regular visitor of OWASP London meetings, but someone who's willing to lend a hand when help is needed. He strikes me as a person who can be relied upon to do the right thing. &lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SQL_Injection_for_Fun_%26_Profit.pdf&amp;diff=47622</id>
		<title>File:SQL Injection for Fun &amp; Profit.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SQL_Injection_for_Fun_%26_Profit.pdf&amp;diff=47622"/>
				<updated>2008-12-04T11:45:14Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=47621</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=47621"/>
				<updated>2008-12-04T11:45:13Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;London&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG, starting at '''6.30pm''' (arrive between 6.00pm and 6.30pm), ending by 8.30pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP (by sending an email to ivanr AT webkreator DOT com) if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: SQL Injection Worms for Fun and Profit''' ([[Media:SPF.pdf|PDF]])&lt;br /&gt;
&lt;br /&gt;
Earlier this year the first (publicly known) SQL Injection worm&lt;br /&gt;
appeared. This worm used SQL Injection to insert malicious scripting&lt;br /&gt;
tags into the pages of over 90,000 sites that were vulnerable to SQL&lt;br /&gt;
injection.&lt;br /&gt;
&lt;br /&gt;
Yet the exploit vector was fairly innocuous, easy to clean up, and easy&lt;br /&gt;
to block. In other words, very much version 0.1 of what a SQL Injection&lt;br /&gt;
worm can achieve.&lt;br /&gt;
&lt;br /&gt;
This talk is going to discuss how far the rabbit hole can go with SQL&lt;br /&gt;
injection based worms, including full compromise of the server OS, and&lt;br /&gt;
why we should be worried by what is going to be coming next out of&lt;br /&gt;
Russia/China/wherever, including a live demo of a proof of concept SQL&lt;br /&gt;
injection worm, &amp;quot;weaponized&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz: OWASP Summit 2008 Report'''&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 OWASP Summit 2008] has been a great success. Dinis, also known as Chief OWASP Evangelist, is going to tell us what we've missed.&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: Protecting Vulnerable Applications with IIS7''' ([[Media:SQL_Injection_for_Fun_&amp;amp;_Profit.pdf‎ |PDF]])&lt;br /&gt;
&lt;br /&gt;
With the advent of IIS7 and its modular design, Microsoft has provided&lt;br /&gt;
the ability to easily integrate custom ASP.NET HttpModules into the IIS7&lt;br /&gt;
request-handling pipeline. This session will present an IIS7 module&lt;br /&gt;
designed to leverage this architecture to actively and dynamically&lt;br /&gt;
protect web applications from attack. With minimal configuration, the&lt;br /&gt;
module can be used to protect virtually any application running on the&lt;br /&gt;
web server, including non-ASP.NET applications (such as those written in&lt;br /&gt;
PHP, Cold Fusion, or classic ASP).&lt;br /&gt;
&lt;br /&gt;
This presentation will outline the overall design and architecture of&lt;br /&gt;
the module, including a detailed explanation of available features and&lt;br /&gt;
attack defense techniques. The session will focus on live demonstrations&lt;br /&gt;
of how the module can easily be installed to protect already-deployed&lt;br /&gt;
applications and how it can block both traditional web application&lt;br /&gt;
attacks, such as SQL injection and Cross-Site Scripting, and&lt;br /&gt;
application-specific vulnerabilities like parameter manipulation and&lt;br /&gt;
authorization attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About Justin:'''&lt;br /&gt;
&lt;br /&gt;
Justin is a Principal Consultant with Gotham Digital Science. He is the&lt;br /&gt;
co-author of &amp;quot;Network Security Tools&amp;quot; (O'Reilly, 2005), a contributing&lt;br /&gt;
author to &amp;quot;Network Security Assessment&amp;quot; (O'Reilly, 2007), and has spoken&lt;br /&gt;
at Blackhat, EuSecWest, RSA, and OSCON in the past. He has over 10 years&lt;br /&gt;
of security testing and consulting experience in network, application,&lt;br /&gt;
source code and wireless testing work for some of the largest commercial&lt;br /&gt;
and government organizations in the United States, United Kingdom, and&lt;br /&gt;
New Zealand. Justin is active in developing security tools for&lt;br /&gt;
penetrating and defending applications, servers, and wireless networks&lt;br /&gt;
(e.g. SQLBrute), and as a compulsive tinkerer he can't leave anything&lt;br /&gt;
alone without at least trying to see how it works.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks and snacks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) - [[Media:owasp-london-security-badges.pdf|PDF]] &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
== Other Activities ==&lt;br /&gt;
&lt;br /&gt;
*'''16th October 2008 - COI Browser Standards for Public Websites'''&lt;br /&gt;
&lt;br /&gt;
The London and [[Scotland]] Chapters joint response to the Central Office of Information draft document on [http://www.coi.gov.uk/guidance.php?page=200 browser standards for public websites] (version 0.13) ([[Image:OWASP-COI-Browser-Standards.pdf]]).&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SPF.pdf&amp;diff=47620</id>
		<title>File:SPF.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SPF.pdf&amp;diff=47620"/>
				<updated>2008-12-04T11:44:34Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=47619</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=47619"/>
				<updated>2008-12-04T11:08:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;London&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG, starting at '''6.30pm''' (arrive between 6.00pm and 6.30pm), ending by 8.30pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP (by sending an email to ivanr AT webkreator DOT com) if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: SQL Injection Worms for Fun and Profit''' ([[Media:SPF.ppt|PPT]])&lt;br /&gt;
&lt;br /&gt;
Earlier this year the first (publicly known) SQL Injection worm&lt;br /&gt;
appeared. This worm used SQL Injection to insert malicious scripting&lt;br /&gt;
tags into the pages of over 90,000 sites that were vulnerable to SQL&lt;br /&gt;
injection.&lt;br /&gt;
&lt;br /&gt;
Yet the exploit vector was fairly innocuous, easy to clean up, and easy&lt;br /&gt;
to block. In other words, very much version 0.1 of what a SQL Injection&lt;br /&gt;
worm can achieve.&lt;br /&gt;
&lt;br /&gt;
This talk is going to discuss how far the rabbit hole can go with SQL&lt;br /&gt;
injection based worms, including full compromise of the server OS, and&lt;br /&gt;
why we should be worried by what is going to be coming next out of&lt;br /&gt;
Russia/China/wherever, including a live demo of a proof of concept SQL&lt;br /&gt;
injection worm, &amp;quot;weaponized&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz: OWASP Summit 2008 Report'''&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 OWASP Summit 2008] has been a great success. Dinis, also known as Chief OWASP Evangelist, is going to tell us what we've missed.&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: Protecting Vulnerable Applications with IIS7''' ([[Media:SQL_Injection_for_Fun_&amp;amp;_Profit.ppt‎ |PPT]])&lt;br /&gt;
&lt;br /&gt;
With the advent of IIS7 and its modular design, Microsoft has provided&lt;br /&gt;
the ability to easily integrate custom ASP.NET HttpModules into the IIS7&lt;br /&gt;
request-handling pipeline. This session will present an IIS7 module&lt;br /&gt;
designed to leverage this architecture to actively and dynamically&lt;br /&gt;
protect web applications from attack. With minimal configuration, the&lt;br /&gt;
module can be used to protect virtually any application running on the&lt;br /&gt;
web server, including non-ASP.NET applications (such as those written in&lt;br /&gt;
PHP, Cold Fusion, or classic ASP).&lt;br /&gt;
&lt;br /&gt;
This presentation will outline the overall design and architecture of&lt;br /&gt;
the module, including a detailed explanation of available features and&lt;br /&gt;
attack defense techniques. The session will focus on live demonstrations&lt;br /&gt;
of how the module can easily be installed to protect already-deployed&lt;br /&gt;
applications and how it can block both traditional web application&lt;br /&gt;
attacks, such as SQL injection and Cross-Site Scripting, and&lt;br /&gt;
application-specific vulnerabilities like parameter manipulation and&lt;br /&gt;
authorization attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About Justin:'''&lt;br /&gt;
&lt;br /&gt;
Justin is a Principal Consultant with Gotham Digital Science. He is the&lt;br /&gt;
co-author of &amp;quot;Network Security Tools&amp;quot; (O'Reilly, 2005), a contributing&lt;br /&gt;
author to &amp;quot;Network Security Assessment&amp;quot; (O'Reilly, 2007), and has spoken&lt;br /&gt;
at Blackhat, EuSecWest, RSA, and OSCON in the past. He has over 10 years&lt;br /&gt;
of security testing and consulting experience in network, application,&lt;br /&gt;
source code and wireless testing work for some of the largest commercial&lt;br /&gt;
and government organizations in the United States, United Kingdom, and&lt;br /&gt;
New Zealand. Justin is active in developing security tools for&lt;br /&gt;
penetrating and defending applications, servers, and wireless networks&lt;br /&gt;
(e.g. SQLBrute), and as a compulsive tinkerer he can't leave anything&lt;br /&gt;
alone without at least trying to see how it works.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks and snacks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) - [[Media:owasp-london-security-badges.pdf|PDF]] &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
== Other Activities ==&lt;br /&gt;
&lt;br /&gt;
*'''16th October 2008 - COI Browser Standards for Public Websites'''&lt;br /&gt;
&lt;br /&gt;
The London and [[Scotland]] Chapters joint response to the Central Office of Information draft document on [http://www.coi.gov.uk/guidance.php?page=200 browser standards for public websites] (version 0.13) ([[Image:OWASP-COI-Browser-Standards.pdf]]).&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SQL_Injection_for_Fun_%26_Profit.ppt&amp;diff=47618</id>
		<title>File:SQL Injection for Fun &amp; Profit.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SQL_Injection_for_Fun_%26_Profit.ppt&amp;diff=47618"/>
				<updated>2008-12-04T11:08:27Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=47617</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=47617"/>
				<updated>2008-12-04T11:07:36Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;London&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG, starting at '''6.30pm''' (arrive between 6.00pm and 6.30pm), ending by 8.30pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP (by sending an email to ivanr AT webkreator DOT com) if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: SQL Injection Worms for Fun and Profit''' ([[Image:SPF.ppt|PPT]])&lt;br /&gt;
&lt;br /&gt;
Earlier this year the first (publicly known) SQL Injection worm&lt;br /&gt;
appeared. This worm used SQL Injection to insert malicious scripting&lt;br /&gt;
tags into the pages of over 90,000 sites that were vulnerable to SQL&lt;br /&gt;
injection.&lt;br /&gt;
&lt;br /&gt;
Yet the exploit vector was fairly innocuous, easy to clean up, and easy&lt;br /&gt;
to block. In other words, very much version 0.1 of what a SQL Injection&lt;br /&gt;
worm can achieve.&lt;br /&gt;
&lt;br /&gt;
This talk is going to discuss how far the rabbit hole can go with SQL&lt;br /&gt;
injection based worms, including full compromise of the server OS, and&lt;br /&gt;
why we should be worried by what is going to be coming next out of&lt;br /&gt;
Russia/China/wherever, including a live demo of a proof of concept SQL&lt;br /&gt;
injection worm, &amp;quot;weaponized&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz: OWASP Summit 2008 Report'''&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 OWASP Summit 2008] has been a great success. Dinis, also known as Chief OWASP Evangelist, is going to tell us what we've missed.&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: Protecting Vulnerable Applications with IIS7'''&lt;br /&gt;
&lt;br /&gt;
With the advent of IIS7 and its modular design, Microsoft has provided&lt;br /&gt;
the ability to easily integrate custom ASP.NET HttpModules into the IIS7&lt;br /&gt;
request-handling pipeline. This session will present an IIS7 module&lt;br /&gt;
designed to leverage this architecture to actively and dynamically&lt;br /&gt;
protect web applications from attack. With minimal configuration, the&lt;br /&gt;
module can be used to protect virtually any application running on the&lt;br /&gt;
web server, including non-ASP.NET applications (such as those written in&lt;br /&gt;
PHP, Cold Fusion, or classic ASP).&lt;br /&gt;
&lt;br /&gt;
This presentation will outline the overall design and architecture of&lt;br /&gt;
the module, including a detailed explanation of available features and&lt;br /&gt;
attack defense techniques. The session will focus on live demonstrations&lt;br /&gt;
of how the module can easily be installed to protect already-deployed&lt;br /&gt;
applications and how it can block both traditional web application&lt;br /&gt;
attacks, such as SQL injection and Cross-Site Scripting, and&lt;br /&gt;
application-specific vulnerabilities like parameter manipulation and&lt;br /&gt;
authorization attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About Justin:'''&lt;br /&gt;
&lt;br /&gt;
Justin is a Principal Consultant with Gotham Digital Science. He is the&lt;br /&gt;
co-author of &amp;quot;Network Security Tools&amp;quot; (O'Reilly, 2005), a contributing&lt;br /&gt;
author to &amp;quot;Network Security Assessment&amp;quot; (O'Reilly, 2007), and has spoken&lt;br /&gt;
at Blackhat, EuSecWest, RSA, and OSCON in the past. He has over 10 years&lt;br /&gt;
of security testing and consulting experience in network, application,&lt;br /&gt;
source code and wireless testing work for some of the largest commercial&lt;br /&gt;
and government organizations in the United States, United Kingdom, and&lt;br /&gt;
New Zealand. Justin is active in developing security tools for&lt;br /&gt;
penetrating and defending applications, servers, and wireless networks&lt;br /&gt;
(e.g. SQLBrute), and as a compulsive tinkerer he can't leave anything&lt;br /&gt;
alone without at least trying to see how it works.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks and snacks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) - [[Media:owasp-london-security-badges.pdf|PDF]] &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
== Other Activities ==&lt;br /&gt;
&lt;br /&gt;
*'''16th October 2008 - COI Browser Standards for Public Websites'''&lt;br /&gt;
&lt;br /&gt;
The London and [[Scotland]] Chapters joint response to the Central Office of Information draft document on [http://www.coi.gov.uk/guidance.php?page=200 browser standards for public websites] (version 0.13) ([[Image:OWASP-COI-Browser-Standards.pdf]]).&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=47616</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=47616"/>
				<updated>2008-12-04T11:07:24Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;London&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG, starting at '''6.30pm''' (arrive between 6.00pm and 6.30pm), ending by 8.30pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP (by sending an email to ivanr AT webkreator DOT com) if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: SQL Injection Worms for Fun and Profit''' ([[Image:SPF.png|PPT]])&lt;br /&gt;
&lt;br /&gt;
Earlier this year the first (publicly known) SQL Injection worm&lt;br /&gt;
appeared. This worm used SQL Injection to insert malicious scripting&lt;br /&gt;
tags into the pages of over 90,000 sites that were vulnerable to SQL&lt;br /&gt;
injection.&lt;br /&gt;
&lt;br /&gt;
Yet the exploit vector was fairly innocuous, easy to clean up, and easy&lt;br /&gt;
to block. In other words, very much version 0.1 of what a SQL Injection&lt;br /&gt;
worm can achieve.&lt;br /&gt;
&lt;br /&gt;
This talk is going to discuss how far the rabbit hole can go with SQL&lt;br /&gt;
injection based worms, including full compromise of the server OS, and&lt;br /&gt;
why we should be worried by what is going to be coming next out of&lt;br /&gt;
Russia/China/wherever, including a live demo of a proof of concept SQL&lt;br /&gt;
injection worm, &amp;quot;weaponized&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz: OWASP Summit 2008 Report'''&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 OWASP Summit 2008] has been a great success. Dinis, also known as Chief OWASP Evangelist, is going to tell us what we've missed.&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: Protecting Vulnerable Applications with IIS7'''&lt;br /&gt;
&lt;br /&gt;
With the advent of IIS7 and its modular design, Microsoft has provided&lt;br /&gt;
the ability to easily integrate custom ASP.NET HttpModules into the IIS7&lt;br /&gt;
request-handling pipeline. This session will present an IIS7 module&lt;br /&gt;
designed to leverage this architecture to actively and dynamically&lt;br /&gt;
protect web applications from attack. With minimal configuration, the&lt;br /&gt;
module can be used to protect virtually any application running on the&lt;br /&gt;
web server, including non-ASP.NET applications (such as those written in&lt;br /&gt;
PHP, Cold Fusion, or classic ASP).&lt;br /&gt;
&lt;br /&gt;
This presentation will outline the overall design and architecture of&lt;br /&gt;
the module, including a detailed explanation of available features and&lt;br /&gt;
attack defense techniques. The session will focus on live demonstrations&lt;br /&gt;
of how the module can easily be installed to protect already-deployed&lt;br /&gt;
applications and how it can block both traditional web application&lt;br /&gt;
attacks, such as SQL injection and Cross-Site Scripting, and&lt;br /&gt;
application-specific vulnerabilities like parameter manipulation and&lt;br /&gt;
authorization attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About Justin:'''&lt;br /&gt;
&lt;br /&gt;
Justin is a Principal Consultant with Gotham Digital Science. He is the&lt;br /&gt;
co-author of &amp;quot;Network Security Tools&amp;quot; (O'Reilly, 2005), a contributing&lt;br /&gt;
author to &amp;quot;Network Security Assessment&amp;quot; (O'Reilly, 2007), and has spoken&lt;br /&gt;
at Blackhat, EuSecWest, RSA, and OSCON in the past. He has over 10 years&lt;br /&gt;
of security testing and consulting experience in network, application,&lt;br /&gt;
source code and wireless testing work for some of the largest commercial&lt;br /&gt;
and government organizations in the United States, United Kingdom, and&lt;br /&gt;
New Zealand. Justin is active in developing security tools for&lt;br /&gt;
penetrating and defending applications, servers, and wireless networks&lt;br /&gt;
(e.g. SQLBrute), and as a compulsive tinkerer he can't leave anything&lt;br /&gt;
alone without at least trying to see how it works.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks and snacks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) - [[Media:owasp-london-security-badges.pdf|PDF]] &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
== Other Activities ==&lt;br /&gt;
&lt;br /&gt;
*'''16th October 2008 - COI Browser Standards for Public Websites'''&lt;br /&gt;
&lt;br /&gt;
The London and [[Scotland]] Chapters joint response to the Central Office of Information draft document on [http://www.coi.gov.uk/guidance.php?page=200 browser standards for public websites] (version 0.13) ([[Image:OWASP-COI-Browser-Standards.pdf]]).&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:SPF.ppt&amp;diff=47615</id>
		<title>File:SPF.ppt</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:SPF.ppt&amp;diff=47615"/>
				<updated>2008-12-04T11:05:50Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=46274</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=46274"/>
				<updated>2008-11-12T14:27:03Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;London&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG, starting at '''6.30pm''' (arrive between 6.00pm and 6.30pm), ending by 8.30pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP (by sending an email to ivanr AT webkreator DOT com) if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: SQL Injection Worms for Fun and Profit'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year the first (publicly known) SQL Injection worm&lt;br /&gt;
appeared. This worm used SQL Injection to insert malicious scripting&lt;br /&gt;
tags into the pages of over 90,000 sites that were vulnerable to SQL&lt;br /&gt;
injection.&lt;br /&gt;
&lt;br /&gt;
Yet the exploit vector was fairly innocuous, easy to clean up, and easy&lt;br /&gt;
to block. In other words, very much version 0.1 of what a SQL Injection&lt;br /&gt;
worm can achieve.&lt;br /&gt;
&lt;br /&gt;
This talk is going to discuss how far the rabbit hole can go with SQL&lt;br /&gt;
injection based worms, including full compromise of the server OS, and&lt;br /&gt;
why we should be worried by what is going to be coming next out of&lt;br /&gt;
Russia/China/wherever, including a live demo of a proof of concept SQL&lt;br /&gt;
injection worm, &amp;quot;weaponized&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz: OWASP Summit 2008 Report'''&lt;br /&gt;
&lt;br /&gt;
The [http://www.owasp.org/index.php/OWASP_EU_Summit_2008 OWASP Summit 2008] has been a great success. Dinis, also known as Chief OWASP Evangelist, is going to tell us what we've missed.&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: Protecting Vulnerable Applications with IIS7'''&lt;br /&gt;
&lt;br /&gt;
With the advent of IIS7 and its modular design, Microsoft has provided&lt;br /&gt;
the ability to easily integrate custom ASP.NET HttpModules into the IIS7&lt;br /&gt;
request-handling pipeline. This session will present an IIS7 module&lt;br /&gt;
designed to leverage this architecture to actively and dynamically&lt;br /&gt;
protect web applications from attack. With minimal configuration, the&lt;br /&gt;
module can be used to protect virtually any application running on the&lt;br /&gt;
web server, including non-ASP.NET applications (such as those written in&lt;br /&gt;
PHP, Cold Fusion, or classic ASP).&lt;br /&gt;
&lt;br /&gt;
This presentation will outline the overall design and architecture of&lt;br /&gt;
the module, including a detailed explanation of available features and&lt;br /&gt;
attack defense techniques. The session will focus on live demonstrations&lt;br /&gt;
of how the module can easily be installed to protect already-deployed&lt;br /&gt;
applications and how it can block both traditional web application&lt;br /&gt;
attacks, such as SQL injection and Cross-Site Scripting, and&lt;br /&gt;
application-specific vulnerabilities like parameter manipulation and&lt;br /&gt;
authorization attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About Justin:'''&lt;br /&gt;
&lt;br /&gt;
Justin is a Principal Consultant with Gotham Digital Science. He is the&lt;br /&gt;
co-author of &amp;quot;Network Security Tools&amp;quot; (O'Reilly, 2005), a contributing&lt;br /&gt;
author to &amp;quot;Network Security Assessment&amp;quot; (O'Reilly, 2007), and has spoken&lt;br /&gt;
at Blackhat, EuSecWest, RSA, and OSCON in the past. He has over 10 years&lt;br /&gt;
of security testing and consulting experience in network, application,&lt;br /&gt;
source code and wireless testing work for some of the largest commercial&lt;br /&gt;
and government organizations in the United States, United Kingdom, and&lt;br /&gt;
New Zealand. Justin is active in developing security tools for&lt;br /&gt;
penetrating and defending applications, servers, and wireless networks&lt;br /&gt;
(e.g. SQLBrute), and as a compulsive tinkerer he can't leave anything&lt;br /&gt;
alone without at least trying to see how it works.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks and snacks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) - [[Media:owasp-london-security-badges.pdf|PDF]] &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
== Other Activities ==&lt;br /&gt;
&lt;br /&gt;
*'''16th October 2008 - COI Browser Standards for Public Websites'''&lt;br /&gt;
&lt;br /&gt;
The London and [[Scotland]] Chapters joint response to the Central Office of Information draft document on [http://www.coi.gov.uk/guidance.php?page=200 browser standards for public websites] (version 0.13) ([[Image:OWASP-COI-Browser-Standards.pdf]]).&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=46273</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=46273"/>
				<updated>2008-11-12T14:26:33Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;London&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG, starting at '''6.30pm''' (arrive between 6.00pm and 6.30pm), ending by 8.30pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: SQL Injection Worms for Fun and Profit'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year the first (publicly known) SQL Injection worm&lt;br /&gt;
appeared. This worm used SQL Injection to insert malicious scripting&lt;br /&gt;
tags into the pages of over 90,000 sites that were vulnerable to SQL&lt;br /&gt;
injection.&lt;br /&gt;
&lt;br /&gt;
Yet the exploit vector was fairly innocuous, easy to clean up, and easy&lt;br /&gt;
to block. In other words, very much version 0.1 of what a SQL Injection&lt;br /&gt;
worm can achieve.&lt;br /&gt;
&lt;br /&gt;
This talk is going to discuss how far the rabbit hole can go with SQL&lt;br /&gt;
injection based worms, including full compromise of the server OS, and&lt;br /&gt;
why we should be worried by what is going to be coming next out of&lt;br /&gt;
Russia/China/wherever, including a live demo of a proof of concept SQL&lt;br /&gt;
injection worm, &amp;quot;weaponized&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz: OWASP Summit 2008 Report'''&lt;br /&gt;
&lt;br /&gt;
The [[http://www.owasp.org/index.php/OWASP_EU_Summit_2008 OWASP Summit 2008]] has been a great success. Dinis, also known as Chief OWASP Evangelist, is going to tell us what we've missed.&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: Protecting Vulnerable Applications with IIS7'''&lt;br /&gt;
&lt;br /&gt;
With the advent of IIS7 and its modular design, Microsoft has provided&lt;br /&gt;
the ability to easily integrate custom ASP.NET HttpModules into the IIS7&lt;br /&gt;
request-handling pipeline. This session will present an IIS7 module&lt;br /&gt;
designed to leverage this architecture to actively and dynamically&lt;br /&gt;
protect web applications from attack. With minimal configuration, the&lt;br /&gt;
module can be used to protect virtually any application running on the&lt;br /&gt;
web server, including non-ASP.NET applications (such as those written in&lt;br /&gt;
PHP, Cold Fusion, or classic ASP).&lt;br /&gt;
&lt;br /&gt;
This presentation will outline the overall design and architecture of&lt;br /&gt;
the module, including a detailed explanation of available features and&lt;br /&gt;
attack defense techniques. The session will focus on live demonstrations&lt;br /&gt;
of how the module can easily be installed to protect already-deployed&lt;br /&gt;
applications and how it can block both traditional web application&lt;br /&gt;
attacks, such as SQL injection and Cross-Site Scripting, and&lt;br /&gt;
application-specific vulnerabilities like parameter manipulation and&lt;br /&gt;
authorization attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About Justin:'''&lt;br /&gt;
&lt;br /&gt;
Justin is a Principal Consultant with Gotham Digital Science. He is the&lt;br /&gt;
co-author of &amp;quot;Network Security Tools&amp;quot; (O'Reilly, 2005), a contributing&lt;br /&gt;
author to &amp;quot;Network Security Assessment&amp;quot; (O'Reilly, 2007), and has spoken&lt;br /&gt;
at Blackhat, EuSecWest, RSA, and OSCON in the past. He has over 10 years&lt;br /&gt;
of security testing and consulting experience in network, application,&lt;br /&gt;
source code and wireless testing work for some of the largest commercial&lt;br /&gt;
and government organizations in the United States, United Kingdom, and&lt;br /&gt;
New Zealand. Justin is active in developing security tools for&lt;br /&gt;
penetrating and defending applications, servers, and wireless networks&lt;br /&gt;
(e.g. SQLBrute), and as a compulsive tinkerer he can't leave anything&lt;br /&gt;
alone without at least trying to see how it works.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks and snacks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) - [[Media:owasp-london-security-badges.pdf|PDF]] &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
== Other Activities ==&lt;br /&gt;
&lt;br /&gt;
*'''16th October 2008 - COI Browser Standards for Public Websites'''&lt;br /&gt;
&lt;br /&gt;
The London and [[Scotland]] Chapters joint response to the Central Office of Information draft document on [http://www.coi.gov.uk/guidance.php?page=200 browser standards for public websites] (version 0.13) ([[Image:OWASP-COI-Browser-Standards.pdf]]).&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=46272</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=46272"/>
				<updated>2008-11-12T14:25:25Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;London&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG, starting at '''6.30pm''' (arrive between 6.00pm and 6.30pm), ending by 8.30pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: SQL Injection Worms for Fun and Profit'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year the first (publicly known) SQL Injection worm&lt;br /&gt;
appeared. This worm used SQL Injection to insert malicious scripting&lt;br /&gt;
tags into the pages of over 90,000 sites that were vulnerable to SQL&lt;br /&gt;
injection.&lt;br /&gt;
&lt;br /&gt;
Yet the exploit vector was fairly innocuous, easy to clean up, and easy&lt;br /&gt;
to block. In other words, very much version 0.1 of what a SQL Injection&lt;br /&gt;
worm can achieve.&lt;br /&gt;
&lt;br /&gt;
This talk is going to discuss how far the rabbit hole can go with SQL&lt;br /&gt;
injection based worms, including full compromise of the server OS, and&lt;br /&gt;
why we should be worried by what is going to be coming next out of&lt;br /&gt;
Russia/China/wherever, including a live demo of a proof of concept SQL&lt;br /&gt;
injection worm, &amp;quot;weaponized&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
'''Dinis Cruz: OWASP Summit 2008 Report'''&lt;br /&gt;
&lt;br /&gt;
The [[http://www.owasp.org/index.php/OWASP_EU_Summit_2008|OWASP Summit 2008]] has been a great success. Dinis, also known as Chief OWASP Evangelist, is going to tell us what we've missed.&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: Protecting Vulnerable Applications with IIS7'''&lt;br /&gt;
&lt;br /&gt;
With the advent of IIS7 and its modular design, Microsoft has provided&lt;br /&gt;
the ability to easily integrate custom ASP.NET HttpModules into the IIS7&lt;br /&gt;
request-handling pipeline. This session will present an IIS7 module&lt;br /&gt;
designed to leverage this architecture to actively and dynamically&lt;br /&gt;
protect web applications from attack. With minimal configuration, the&lt;br /&gt;
module can be used to protect virtually any application running on the&lt;br /&gt;
web server, including non-ASP.NET applications (such as those written in&lt;br /&gt;
PHP, Cold Fusion, or classic ASP).&lt;br /&gt;
&lt;br /&gt;
This presentation will outline the overall design and architecture of&lt;br /&gt;
the module, including a detailed explanation of available features and&lt;br /&gt;
attack defense techniques. The session will focus on live demonstrations&lt;br /&gt;
of how the module can easily be installed to protect already-deployed&lt;br /&gt;
applications and how it can block both traditional web application&lt;br /&gt;
attacks, such as SQL injection and Cross-Site Scripting, and&lt;br /&gt;
application-specific vulnerabilities like parameter manipulation and&lt;br /&gt;
authorization attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About Justin:'''&lt;br /&gt;
&lt;br /&gt;
Justin is a Principal Consultant with Gotham Digital Science. He is the&lt;br /&gt;
co-author of &amp;quot;Network Security Tools&amp;quot; (O'Reilly, 2005), a contributing&lt;br /&gt;
author to &amp;quot;Network Security Assessment&amp;quot; (O'Reilly, 2007), and has spoken&lt;br /&gt;
at Blackhat, EuSecWest, RSA, and OSCON in the past. He has over 10 years&lt;br /&gt;
of security testing and consulting experience in network, application,&lt;br /&gt;
source code and wireless testing work for some of the largest commercial&lt;br /&gt;
and government organizations in the United States, United Kingdom, and&lt;br /&gt;
New Zealand. Justin is active in developing security tools for&lt;br /&gt;
penetrating and defending applications, servers, and wireless networks&lt;br /&gt;
(e.g. SQLBrute), and as a compulsive tinkerer he can't leave anything&lt;br /&gt;
alone without at least trying to see how it works.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks and snacks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) - [[Media:owasp-london-security-badges.pdf|PDF]] &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
== Other Activities ==&lt;br /&gt;
&lt;br /&gt;
*'''16th October 2008 - COI Browser Standards for Public Websites'''&lt;br /&gt;
&lt;br /&gt;
The London and [[Scotland]] Chapters joint response to the Central Office of Information draft document on [http://www.coi.gov.uk/guidance.php?page=200 browser standards for public websites] (version 0.13) ([[Image:OWASP-COI-Browser-Standards.pdf]]).&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Securing_WebGoat_using_ModSecurity_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45072</id>
		<title>Project Information:template Securing WebGoat using ModSecurity - Final Review - First Reviewer - D</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Securing_WebGoat_using_ModSecurity_-_Final_Review_-_First_Reviewer_-_D&amp;diff=45072"/>
				<updated>2008-10-29T13:38:05Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Securing WebGoat using ModSecurity|Clik here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''FINAL REVIEW''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART I''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|OWASP Securing WebGoat using ModSecurity Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The objectives of the project have been accomplished. This is a research project and the scope of the problem was largely unknown at the beginning.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|85% out of 90%.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The use of Lua scripting is very interesting, but the dynamic evaluation of externally-supplied data is extremely dangerous. This project demonstrates one approach that mustn't be taken in production (which is acceptable, considering the research nature of the project).&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:white&amp;quot; align=&amp;quot;center&amp;quot;|'''PART II''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:white&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Assessment Criteria&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[:Category:OWASP Project Assessment|OWASP Project Assessment Criteria]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Alpha Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Yes.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
2. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Beta Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Yes.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
3. Having into consideration the [[:Category:OWASP Project Assessment|OWASP Project Assessment Methodology]] which criteria, if any, haven’t been fulfilled in terms of '''Release Quality''' status?&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Not applicable.&lt;br /&gt;
 |-  &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
4. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Securing_WebGoat_using_ModSecurity&amp;diff=45070</id>
		<title>Project Information:template Securing WebGoat using ModSecurity</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Securing_WebGoat_using_ModSecurity&amp;diff=45070"/>
				<updated>2008-10-29T13:31:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Securing WebGoat using ModSecurity Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project is to create custom Modsecurity rulesets that, in addition to the Core Set, will protect WebGoat 5.1 from as many of its vulnerabilities as possible (the goal is 90%) without changing one line of source code. To ensure that it will be a complete 'no touch' on WebGoat and its environment, ModSecurity will be configured on Apache server as a remote proxy server. For those vulnerabilities that cannot be prevented (partially or not at all), I will document my efforts in attempting to protect them. Business logic vulnerabilities will be particularly challenging to solve.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:stephencraig.evans(at)gmail.com '''Stephen Evans''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-webgoat-using-modsecurity '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-WebGoat-using-ModSecurity(at)lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:ivan.ristic@breach.com '''Ivan Ristic &amp;amp;&amp;lt;br&amp;gt;Breach Group''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:christian.folini(at)netnea.com '''Christian Folini''']&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;'''X'''&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [[:OWASP Securing WebGoat using ModSecurity Project|Main project page]]&lt;br /&gt;
* [[:OWASP ModSecurity Securing WebGoat Section4 Sublesson 04.2|Section 4, Mitigating the WebGoat lessons]] &lt;br /&gt;
*(If appropriate, links to be added)&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''RELATED PROJECTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[[:Category:OWASP WebGoat Project|OWASP WebGoat Project]]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code Beta'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code Beta'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code Beta''' &amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=43467</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=43467"/>
				<updated>2008-10-17T09:51:00Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;London&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG, starting at '''6.30pm''' (arrive between 6.00pm and 6.30pm), ending by 8.30pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: SQL Injection Worms for Fun and Profit'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year the first (publicly known) SQL Injection worm&lt;br /&gt;
appeared. This worm used SQL Injection to insert malicious scripting&lt;br /&gt;
tags into the pages of over 90,000 sites that were vulnerable to SQL&lt;br /&gt;
injection.&lt;br /&gt;
&lt;br /&gt;
Yet the exploit vector was fairly innocuous, easy to clean up, and easy&lt;br /&gt;
to block. In other words, very much version 0.1 of what a SQL Injection&lt;br /&gt;
worm can achieve.&lt;br /&gt;
&lt;br /&gt;
This talk is going to discuss how far the rabbit hole can go with SQL&lt;br /&gt;
injection based worms, including full compromise of the server OS, and&lt;br /&gt;
why we should be worried by what is going to be coming next out of&lt;br /&gt;
Russia/China/wherever, including a live demo of a proof of concept SQL&lt;br /&gt;
injection worm, &amp;quot;weaponized&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: Protecting Vulnerable Applications with IIS7'''&lt;br /&gt;
&lt;br /&gt;
With the advent of IIS7 and its modular design, Microsoft has provided&lt;br /&gt;
the ability to easily integrate custom ASP.NET HttpModules into the IIS7&lt;br /&gt;
request-handling pipeline. This session will present an IIS7 module&lt;br /&gt;
designed to leverage this architecture to actively and dynamically&lt;br /&gt;
protect web applications from attack. With minimal configuration, the&lt;br /&gt;
module can be used to protect virtually any application running on the&lt;br /&gt;
web server, including non-ASP.NET applications (such as those written in&lt;br /&gt;
PHP, Cold Fusion, or classic ASP).&lt;br /&gt;
&lt;br /&gt;
This presentation will outline the overall design and architecture of&lt;br /&gt;
the module, including a detailed explanation of available features and&lt;br /&gt;
attack defense techniques. The session will focus on live demonstrations&lt;br /&gt;
of how the module can easily be installed to protect already-deployed&lt;br /&gt;
applications and how it can block both traditional web application&lt;br /&gt;
attacks, such as SQL injection and Cross-Site Scripting, and&lt;br /&gt;
application-specific vulnerabilities like parameter manipulation and&lt;br /&gt;
authorization attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About Justin:'''&lt;br /&gt;
&lt;br /&gt;
Justin is a Principal Consultant with Gotham Digital Science. He is the&lt;br /&gt;
co-author of &amp;quot;Network Security Tools&amp;quot; (O'Reilly, 2005), a contributing&lt;br /&gt;
author to &amp;quot;Network Security Assessment&amp;quot; (O'Reilly, 2007), and has spoken&lt;br /&gt;
at Blackhat, EuSecWest, RSA, and OSCON in the past. He has over 10 years&lt;br /&gt;
of security testing and consulting experience in network, application,&lt;br /&gt;
source code and wireless testing work for some of the largest commercial&lt;br /&gt;
and government organizations in the United States, United Kingdom, and&lt;br /&gt;
New Zealand. Justin is active in developing security tools for&lt;br /&gt;
penetrating and defending applications, servers, and wireless networks&lt;br /&gt;
(e.g. SQLBrute), and as a compulsive tinkerer he can't leave anything&lt;br /&gt;
alone without at least trying to see how it works.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks and snacks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) - [[Media:owasp-london-security-badges.pdf|PDF]] &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Owasp-london-security-badges.pdf&amp;diff=43466</id>
		<title>File:Owasp-london-security-badges.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Owasp-london-security-badges.pdf&amp;diff=43466"/>
				<updated>2008-10-17T09:48:51Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=41865</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=41865"/>
				<updated>2008-10-03T08:46:57Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. OWASP is like &amp;quot;public radio&amp;quot; so support our efforts join today as a corporate or individual member learn more [https://www.owasp.org/index.php/Membership CLICK HERE]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Note as of Oct 2nd, we are adding the videos as the become avail., and expect them to be all online in the next few days...&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th VIDEOS ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;h2&amp;gt;Day 1 – Sept 24th, 2008 &amp;lt;/h2&amp;gt; &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: BALLROOM&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: SKYLINE&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: TIMESQUARE&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:50 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Doors Open for Attendee/Speaker Registration &lt;br /&gt;
''avoid lines come early get your caffeine fix and use free wifi''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, how we got here and where we are going? - &amp;lt;b&amp;gt;[http://video.google.com/videoplay?docid=2333070846287409588&amp;amp;hl=en VIDEO] / [http://www.owasp.org/images/b/b7/AppSecNYC08-Delivering_AppSec_Info.ppt Dave Wichers's SLIDES]&amp;lt;/b&amp;gt;&lt;br /&gt;
''OWASP Foundation: [[Contact | Jeff Williams]], [[Contact | Dinis Cruz]], [[Contact | Dave Wichers]], [[Contact | Tom Brennan]], [[Contact | Sebastien Deleersnyder]]'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 | Analysis of the Web Hacking Incidents Database (WHID)]] VIDEO / SLIDES&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map] VIDEO / SLIDES &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives] - VIDEO / SLIDES&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research - VIDEO / SLIDES&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;quot;Google Hacking&amp;quot; Project  - VIDEO / SLIDES&lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research  - VIDEO / SLIDES&lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Get Rich or Die Trying - Making Money on The Web, The Black Hat Way - VIDEO / SLIDES&lt;br /&gt;
''[http://www.linkedin.com/in/treyford Trey Ford], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.linkedin.com/pub/0/205/77a Jeremiah Grossman]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-rohit-sethi | Rohit Sethi]] &amp;amp; [[OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni | Sahba Kazerooni]]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://blogs.adobe.com/psirt/2008/09/thanks_to_jeremiah_grossman_an.html New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Web Intrusion Detection with ModSecurity - [[Media:OWASP_NYC_2008-Web_Intrusion_Detection_with_ModSecurity.pdf|SLIDES]]&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Using Layer 8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, [http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, [http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital, &amp;lt;br&amp;gt; [http://www.linkedin.com/in/mahidontamsetti   Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou | Yiannis Pavlosoglou]]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Testing Guide - Offensive Assessing Financial Applications&lt;br /&gt;
'' [[OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert | Daniel Cuthbert]]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho | w3af - A Framework to own the web]]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [[ESAPI | (ESAPI) Project]]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann | Multidisciplinary Bank Attacks]]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
[http://www.linkedin.com/in/packetfocus Joshua Perrymon]&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[Payment_Card_Data_Security_and_the_new_Enterprise_Java | Payment Card Data Security and the new Enterprise Java]]&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar | Dr. B. V. Kumar]] &amp;amp; [[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav | Mr. Abhay Bhargav]]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-20:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Chapter Leader / Project Leader working session ''OWSAP Board/Chapter Leaders''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;b&amp;gt;(ISC)2 Cocktail Hour&amp;lt;/b&amp;gt; all welcome to attend for special announcement &amp;lt;br&amp;gt; presented by: [https://www.isc2.org/cgi-bin/content.cgi?page=351 W. Hord Tipton, Executive Director of (ISC)2]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Technology Movie Night ''[http://www.youtube.com/watch?v=LlKDkTbUFhU&amp;amp;feature=related Sneakers], [http://www.youtube.com/watch?v=tAcEzhQ7oqA WarGames], [http://hackersarepeopletoo.com HackersArePeopleToo], [http://www.youtube.com/watch?v=4Be-ZzcXVLw TigerTeam]'' from 19:00 - 23:00&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00+ || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Event Party/Reception &amp;lt;br&amp;gt;Event badge required for admission &amp;lt;br&amp;gt;[[OWASP_NYC_AppSec_2008_Conference/ctf | Food, Drinks w/ New &amp;amp; Old Friends - break out the laptop and play capture the flag for fun and prizes.]] &amp;lt;br&amp;gt;''Location: HOTEL BALLROOM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Day 2 – Sept 25th, 2008 &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Software Development: The Last Security Frontier&lt;br /&gt;
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior&lt;br /&gt;
Executive Director and member of the Board of Directors, (ISC)²''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide: Web Application Firewalls]]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html Tiger Team - APPSEC Projects]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OpenSource Tools ''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Industry Analyst with Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[Category:OWASP_CLASP_Project | CLASP (Comprehensive, Lightweight Application Security Process)]]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[[User:Wichers | Dave Wichers]]'' [http://www.owasp.org/images/a/a3/AppSecNYC08-Agile_and_Secure.ppt ppt]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]'' &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-vadim-okun | Vadim Okun]]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[User_talk:Jian | Lotus Notes/Domino Web Application Security]]&lt;br /&gt;
''[[User_talk:Jian | Jian Hui Wang]]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The OWASP Orizon Project: towards version 1.0] [[User:Thesp0nge | Paolo Perego]]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[Building_Usable_Security | Building Usable Security]]&lt;br /&gt;
[[Zed_Abbadi | Zed Abbadi]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani'' &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[OWASP_EU_Summit_2008 | OWASP EU Summit Portugal]]&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Code Secrets&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Detecting User Disposition - Polar Bears in a Whiteout [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen]''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Corruption  '''[http://www.immunitysec.com Dave Aitel]'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Event Wrap-Up / Speaker &amp;amp; CTF Awards and Sponsor Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better!&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=41864</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=41864"/>
				<updated>2008-10-03T08:46:22Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
Our mission is to make application security &amp;quot;visible,&amp;quot; so that people and organizations can make informed decisions about application security risks. Everyone is free to participate in OWASP and all of our materials are available under a free and open software license. The OWASP Foundation is a 501c3 not-for-profit charitable organization that ensures the ongoing availability and support for our work. OWASP is like &amp;quot;public radio&amp;quot; so support our efforts join today as a corporate or individual member learn more [https://www.owasp.org/index.php/Membership CLICK HERE]&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
*Note as of Oct 2nd, we are adding the videos as the become avail., and expect them to be all online in the next few days...&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th VIDEOS ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | &amp;lt;h2&amp;gt;Day 1 – Sept 24th, 2008 &amp;lt;/h2&amp;gt; &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: BALLROOM&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: SKYLINE&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: TIMESQUARE&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-08:50 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | Doors Open for Attendee/Speaker Registration &lt;br /&gt;
''avoid lines come early get your caffeine fix and use free wifi''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, how we got here and where we are going? - &amp;lt;b&amp;gt;[http://video.google.com/videoplay?docid=2333070846287409588&amp;amp;hl=en VIDEO] / [http://www.owasp.org/images/b/b7/AppSecNYC08-Delivering_AppSec_Info.ppt Dave Wichers's SLIDES]&amp;lt;/b&amp;gt;&lt;br /&gt;
''OWASP Foundation: [[Contact | Jeff Williams]], [[Contact | Dinis Cruz]], [[Contact | Dave Wichers]], [[Contact | Tom Brennan]], [[Contact | Sebastien Deleersnyder]]'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 | Analysis of the Web Hacking Incidents Database (WHID)]] VIDEO / SLIDES&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map] VIDEO / SLIDES &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives] - VIDEO / SLIDES&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research - VIDEO / SLIDES&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;quot;Google Hacking&amp;quot; Project  - VIDEO / SLIDES&lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research  - VIDEO / SLIDES&lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Get Rich or Die Trying - Making Money on The Web, The Black Hat Way - VIDEO / SLIDES&lt;br /&gt;
''[http://www.linkedin.com/in/treyford Trey Ford], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.linkedin.com/pub/0/205/77a Jeremiah Grossman]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-rohit-sethi | Rohit Sethi]] &amp;amp; [[OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni | Sahba Kazerooni]]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://blogs.adobe.com/psirt/2008/09/thanks_to_jeremiah_grossman_an.html New 0-Day Browser Exploits: Clickjacking - yea, this is bad...]&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Web Intrusion Detection with ModSecurity - [[OWASP_NYC_2008-Web_Intrusion_Detection_with_ModSecurity.pdf|SLIDES]]&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Using Layer 8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs, [http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers, [http://www.linkedin.com/pub/5/658/872 Tom King] CISO, Barclays Capital, &amp;lt;br&amp;gt; [http://www.linkedin.com/in/mahidontamsetti   Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Security_Assessing_Java_RMI Security Assessing Java RMI] &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou | Yiannis Pavlosoglou]]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Testing Guide - Offensive Assessing Financial Applications&lt;br /&gt;
'' [[OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert | Daniel Cuthbert]]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho | w3af - A Framework to own the web]]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [[ESAPI | (ESAPI) Project]]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann | Multidisciplinary Bank Attacks]]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
[http://www.linkedin.com/in/packetfocus Joshua Perrymon]&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[Payment_Card_Data_Security_and_the_new_Enterprise_Java | Payment Card Data Security and the new Enterprise Java]]&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar | Dr. B. V. Kumar]] &amp;amp; [[OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav | Mr. Abhay Bhargav]]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 19:00-20:00 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Chapter Leader / Project Leader working session ''OWSAP Board/Chapter Leaders''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;lt;b&amp;gt;(ISC)2 Cocktail Hour&amp;lt;/b&amp;gt; all welcome to attend for special announcement &amp;lt;br&amp;gt; presented by: [https://www.isc2.org/cgi-bin/content.cgi?page=351 W. Hord Tipton, Executive Director of (ISC)2]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Technology Movie Night ''[http://www.youtube.com/watch?v=LlKDkTbUFhU&amp;amp;feature=related Sneakers], [http://www.youtube.com/watch?v=tAcEzhQ7oqA WarGames], [http://hackersarepeopletoo.com HackersArePeopleToo], [http://www.youtube.com/watch?v=4Be-ZzcXVLw TigerTeam]'' from 19:00 - 23:00&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00+ || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Event Party/Reception &amp;lt;br&amp;gt;Event badge required for admission &amp;lt;br&amp;gt;[[OWASP_NYC_AppSec_2008_Conference/ctf | Food, Drinks w/ New &amp;amp; Old Friends - break out the laptop and play capture the flag for fun and prizes.]] &amp;lt;br&amp;gt;''Location: HOTEL BALLROOM''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; |&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;Day 2 – Sept 25th, 2008 &amp;lt;/h2&amp;gt;&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Software Development: The Last Security Frontier&lt;br /&gt;
''[http://blog.isc2.org/isc2_blog/tipton/index.html W. Hord Tipton], CISSP-ISSEP, CAP, CISA, CNSS and former Chief Information Officer for the U.S. Department of the Interior&lt;br /&gt;
Executive Director and member of the Board of Directors, (ISC)²''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls | Best Practices Guide: Web Application Firewalls]]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html Tiger Team - APPSEC Projects]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OpenSource Tools ''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Industry Analyst with Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[Category:OWASP_CLASP_Project | CLASP (Comprehensive, Lightweight Application Security Process)]]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[[User:Wichers | Dave Wichers]]'' [http://www.owasp.org/images/a/a3/AppSecNYC08-Agile_and_Secure.ppt ppt]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]'' &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [[OWASP_NYC_AppSec_2008_Conference/ctf | Capture the Flag]] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]&lt;br /&gt;
''[[OWASP_NYC_AppSec_2008_Conference-vadim-okun | Vadim Okun]]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[User_talk:Jian | Lotus Notes/Domino Web Application Security]]&lt;br /&gt;
''[[User_talk:Jian | Jian Hui Wang]]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project The OWASP Orizon Project: towards version 1.0] [[User:Thesp0nge | Paolo Perego]]&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[Building_Usable_Security | Building Usable Security]]&lt;br /&gt;
[[Zed_Abbadi | Zed Abbadi]]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani'' &lt;br /&gt;
| style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [[OWASP_EU_Summit_2008 | OWASP EU Summit Portugal]]&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Code Secrets&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Detecting User Disposition - Polar Bears in a Whiteout [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen]''&lt;br /&gt;
&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Corruption  '''[http://www.immunitysec.com Dave Aitel]'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Event Wrap-Up / Speaker &amp;amp; CTF Awards and Sponsor Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting - to collect ideas to make OWASP better!&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_NYC_2008-Web_Intrusion_Detection_with_ModSecurity.pdf&amp;diff=41863</id>
		<title>File:OWASP NYC 2008-Web Intrusion Detection with ModSecurity.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_NYC_2008-Web_Intrusion_Detection_with_ModSecurity.pdf&amp;diff=41863"/>
				<updated>2008-10-03T08:44:38Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=40833</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=40833"/>
				<updated>2008-09-22T16:07:00Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference was held on September 14th at the Interdisciplinary Center Herzliya with 250 attendees. The agenda of the full day two track event can be found below.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; width=&amp;quot;68&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 8:30-9:00&lt;br /&gt;
| width=&amp;quot;291&amp;quot;  valign=&amp;quot;top&amp;quot; | Gathering and Socializing&lt;br /&gt;
| width=&amp;quot;296&amp;quot;  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:00-9:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Opening words by Ofer Shezaf, OWASP Israel founder&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #1&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #2&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Management Track&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Fundamentals Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:15-10:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]] ([[Media:OWASP_IL_2008_Amichai_Shulman_BeyondGoogleHackingn.ppt‎|download ppt)]]&amp;lt;BR&amp;gt;Amichai Shulman, Imperva&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]]&amp;lt;BR&amp;gt;Maty Siman, Checkmark&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:00-10:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling] ([[Media:OWASP_Israel_2008-Ristic-Shezaf-ModProfiler.pdf|download PDF]]) &amp;lt;BR&amp;gt;Ivan Ristic, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]] ([[Media:OWASP_IL_2008_Sharabani_BlackBox_Vs_WhiteBox.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Adi Sharabani &amp;amp; Yinnon Haviv, IBM&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:45-11:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:00-11:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008|Trends in Web Hacking: What's hot in 2008]] ([[Media:AppSecEU2008-WHID.ppt|download ppt]]) &amp;lt;BR&amp;gt;Ofer Shezaf, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]] ([[Media:OWASP IL 2008 David Movshovitz AJAX.ppt|download ppt]])&amp;lt;BR&amp;gt;Dr. David Movshovitz, IDC&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:45-12:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testing the Tester – Measuring Quality of Security Testing]]&amp;lt;BR&amp;gt;Ofer Maor, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]] ([[Media:OWASP_IL_2008_Yuli_Stremovsky.GreenSQL_Database_Firewall.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Yuli Stremovsky &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 12:30-13:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Lunch&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Advanced Technology Track&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Practical Technology Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 13:15-14:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]] ([[Media:OWASP IL 2008 Shai Chen PT to Java Client Server Apps.ppt|download ppt]])&amp;lt;BR&amp;gt;Shai Chen, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]] ([[Media:OWASP_IL_2008_Amir_Herzberg_Defending_against_Phishing_without_Client-side_Code.ppt|download ppt]]) &amp;lt;BR&amp;gt;Prof. Amir Herzberg, Bar-Ilan University&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:00-14:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Rosen|Cryptographic elections - how to simultaneously achieve verifiability and privacy]] ([[Media:OWASP_IL_2008_Alon_Resen_eVoting.pdf‎|download pdf]])&amp;lt;BR&amp;gt;Dr. Alon Rosen, IDC&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework rootkits - backdoors inside your Framework]] ([[Media:OWASP IL 2008 Erez Metula .NET Rootkits.ppt|download ppt]])&amp;lt;BR&amp;gt;Erez Metula, 2Bsecure &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:45-15:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:00-15:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]] ([[Media:OWASP_IL_2008_Ronen_Bachar_RIA.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Ronen Bachar, IBM&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]] ([[Media:OWASP_IL_2008_Ohad_Ben_Cohen_Korset.pdf|download pdf]])&amp;lt;BR&amp;gt;Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:45-16:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | Turbo talks (Rump Session), Currently scheduled presentations: &lt;br /&gt;
* Yossi Oren, Automatic Patch-Based Exploit Generation (APEG) ([[Media:OWASP_IL_2008_Yossi_Oren_APEG.ppt|download ppt]])&lt;br /&gt;
* Avi Weissman, Introduction to the Israeli Forum for Information Security (ISIF)&lt;br /&gt;
* Robert Moskovitch, Detection of Unknown Malicious Code via Machine Learning ([[Media:UnknownMalcodeDetection_OWASP-IL-08.pdf|download pdf]])&lt;br /&gt;
* Yaniv Miron, Comsec, UTF7 XSS ([[Media:OWASP_IL_2008_Yaniv_Miron_UTF7_XSS.ppt|download ppt]])&lt;br /&gt;
* Shay Zalalichin &amp;amp; Avi Douglen, Comsec, Breaking CAPTCHA Myths ([[Media:2008-09-14_OWASP_Israel_2008.ppt‎|download ppt]])&lt;br /&gt;
&lt;br /&gt;
'''Closing Words, Ofer Shezaf'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Neer Roggel, the technion&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=40832</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=40832"/>
				<updated>2008-09-22T16:06:38Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference was held on September 14th at the Interdisciplinary Center Herzliya with 250 attendees. The agenda of the full day two track event can be found below.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; width=&amp;quot;68&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 8:30-9:00&lt;br /&gt;
| width=&amp;quot;291&amp;quot;  valign=&amp;quot;top&amp;quot; | Gathering and Socializing&lt;br /&gt;
| width=&amp;quot;296&amp;quot;  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:00-9:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Opening words by Ofer Shezaf, OWASP Israel founder&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #1&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #2&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Management Track&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Fundamentals Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:15-10:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]] ([[Media:OWASP_IL_2008_Amichai_Shulman_BeyondGoogleHackingn.ppt‎|download ppt)]]&amp;lt;BR&amp;gt;Amichai Shulman, Imperva&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]]&amp;lt;BR&amp;gt;Maty Siman, Checkmark&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:00-10:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling]&lt;br /&gt;
([[Media:OWASP_Israel_2008-Ristic-Shezaf-ModProfiler.pdf|download PDF]]) &amp;lt;BR&amp;gt;Ivan Ristic, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]] ([[Media:OWASP_IL_2008_Sharabani_BlackBox_Vs_WhiteBox.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Adi Sharabani &amp;amp; Yinnon Haviv, IBM&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:45-11:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:00-11:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008|Trends in Web Hacking: What's hot in 2008]] ([[Media:AppSecEU2008-WHID.ppt|download ppt]]) &amp;lt;BR&amp;gt;Ofer Shezaf, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]] ([[Media:OWASP IL 2008 David Movshovitz AJAX.ppt|download ppt]])&amp;lt;BR&amp;gt;Dr. David Movshovitz, IDC&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:45-12:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testing the Tester – Measuring Quality of Security Testing]]&amp;lt;BR&amp;gt;Ofer Maor, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]] ([[Media:OWASP_IL_2008_Yuli_Stremovsky.GreenSQL_Database_Firewall.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Yuli Stremovsky &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 12:30-13:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Lunch&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Advanced Technology Track&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Practical Technology Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 13:15-14:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]] ([[Media:OWASP IL 2008 Shai Chen PT to Java Client Server Apps.ppt|download ppt]])&amp;lt;BR&amp;gt;Shai Chen, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]] ([[Media:OWASP_IL_2008_Amir_Herzberg_Defending_against_Phishing_without_Client-side_Code.ppt|download ppt]]) &amp;lt;BR&amp;gt;Prof. Amir Herzberg, Bar-Ilan University&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:00-14:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Rosen|Cryptographic elections - how to simultaneously achieve verifiability and privacy]] ([[Media:OWASP_IL_2008_Alon_Resen_eVoting.pdf‎|download pdf]])&amp;lt;BR&amp;gt;Dr. Alon Rosen, IDC&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework rootkits - backdoors inside your Framework]] ([[Media:OWASP IL 2008 Erez Metula .NET Rootkits.ppt|download ppt]])&amp;lt;BR&amp;gt;Erez Metula, 2Bsecure &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:45-15:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:00-15:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]] ([[Media:OWASP_IL_2008_Ronen_Bachar_RIA.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Ronen Bachar, IBM&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]] ([[Media:OWASP_IL_2008_Ohad_Ben_Cohen_Korset.pdf|download pdf]])&amp;lt;BR&amp;gt;Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:45-16:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | Turbo talks (Rump Session), Currently scheduled presentations: &lt;br /&gt;
* Yossi Oren, Automatic Patch-Based Exploit Generation (APEG) ([[Media:OWASP_IL_2008_Yossi_Oren_APEG.ppt|download ppt]])&lt;br /&gt;
* Avi Weissman, Introduction to the Israeli Forum for Information Security (ISIF)&lt;br /&gt;
* Robert Moskovitch, Detection of Unknown Malicious Code via Machine Learning ([[Media:UnknownMalcodeDetection_OWASP-IL-08.pdf|download pdf]])&lt;br /&gt;
* Yaniv Miron, Comsec, UTF7 XSS ([[Media:OWASP_IL_2008_Yaniv_Miron_UTF7_XSS.ppt|download ppt]])&lt;br /&gt;
* Shay Zalalichin &amp;amp; Avi Douglen, Comsec, Breaking CAPTCHA Myths ([[Media:2008-09-14_OWASP_Israel_2008.ppt‎|download ppt]])&lt;br /&gt;
&lt;br /&gt;
'''Closing Words, Ofer Shezaf'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Neer Roggel, the technion&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=40831</id>
		<title>OWASP Israel 2008 Conference at the Interdisciplinary Center Herzliya (IDC)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Israel_2008_Conference_at_the_Interdisciplinary_Center_Herzliya_(IDC)&amp;diff=40831"/>
				<updated>2008-09-22T16:06:06Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Agenda */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:OWASP_IL_2008_Sponsors}}&lt;br /&gt;
&lt;br /&gt;
The OWASP Israel 2008 conference was held on September 14th at the Interdisciplinary Center Herzliya with 250 attendees. The agenda of the full day two track event can be found below.&lt;br /&gt;
&lt;br /&gt;
== Agenda ==&lt;br /&gt;
&lt;br /&gt;
{| class=&amp;quot;wikitable&amp;quot; &amp;lt;hiddentext&amp;gt;generated with [[:de:Wikipedia:Helferlein/VBA-Macro for EXCEL tableconversion]] V1.7&amp;lt;\hiddentext&amp;gt;&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; width=&amp;quot;68&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 8:30-9:00&lt;br /&gt;
| width=&amp;quot;291&amp;quot;  valign=&amp;quot;top&amp;quot; | Gathering and Socializing&lt;br /&gt;
| width=&amp;quot;296&amp;quot;  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:00-9:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Opening words by Ofer Shezaf, OWASP Israel founder&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #1&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Room #2&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt;font-weight:bold&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Management Track&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | Fundamentals Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 9:15-10:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amichai_Shulman|Web Application Security and Search Engines – Beyond Google Hacking]] ([[Media:OWASP_IL_2008_Amichai_Shulman_BeyondGoogleHackingn.ppt‎|download ppt)]]&amp;lt;BR&amp;gt;Amichai Shulman, Imperva&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Maty_Siman|Application Security - The code analysis way]]&amp;lt;BR&amp;gt;Maty Siman, Checkmark&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:00-10:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ivan_Ristic|No More Signatures: Defending Web Applications from 0-Day Attacks with ModProfiler Using Traffic Profiling]&lt;br /&gt;
([[Media:OWASP_Israel_2008-Ristic-Shezaf-ModProfiler.pdf|download PDF)] &amp;lt;BR&amp;gt;Ivan Ristic, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Adi_Sharabani|Black Box vs. White Box - pros and cons]] ([[Media:OWASP_IL_2008_Sharabani_BlackBox_Vs_WhiteBox.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Adi Sharabani &amp;amp; Yinnon Haviv, IBM&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 10:45-11:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:00-11:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008|Trends in Web Hacking: What's hot in 2008]] ([[Media:AppSecEU2008-WHID.ppt|download ppt]]) &amp;lt;BR&amp;gt;Ofer Shezaf, Breach Security&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_David_Movshovitz|AJAX - new technologies new threats]] ([[Media:OWASP IL 2008 David Movshovitz AJAX.ppt|download ppt]])&amp;lt;BR&amp;gt;Dr. David Movshovitz, IDC&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 11:45-12:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ofer_Maor|Testing the Tester – Measuring Quality of Security Testing]]&amp;lt;BR&amp;gt;Ofer Maor, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Yuli_Stremovsky|GreenSQL - an open source database security gateway]] ([[Media:OWASP_IL_2008_Yuli_Stremovsky.GreenSQL_Database_Firewall.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Yuli Stremovsky &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 12:30-13:15&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Lunch&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | &amp;amp;nbsp;&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Advanced Technology Track&lt;br /&gt;
|style=&amp;quot;font-weight:bold&amp;quot;  valign=&amp;quot;top&amp;quot; | Practical Technology Track&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 13:15-14:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Shai_Chen|Achilles’ heel – Hacking Through Java Protocols]] ([[Media:OWASP IL 2008 Shai Chen PT to Java Client Server Apps.ppt|download ppt]])&amp;lt;BR&amp;gt;Shai Chen, Hacktics&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Amir_Herzberg|Defending against Phishing without Client-side Code]] ([[Media:OWASP_IL_2008_Amir_Herzberg_Defending_against_Phishing_without_Client-side_Code.ppt|download ppt]]) &amp;lt;BR&amp;gt;Prof. Amir Herzberg, Bar-Ilan University&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:00-14:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Alon_Rosen|Cryptographic elections - how to simultaneously achieve verifiability and privacy]] ([[Media:OWASP_IL_2008_Alon_Resen_eVoting.pdf‎|download pdf]])&amp;lt;BR&amp;gt;Dr. Alon Rosen, IDC&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Erez_Metula|.NET Framework rootkits - backdoors inside your Framework]] ([[Media:OWASP IL 2008 Erez Metula .NET Rootkits.ppt|download ppt]])&amp;lt;BR&amp;gt;Erez Metula, 2Bsecure &lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;15&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 14:45-15:00&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot;| Break&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;45&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:00-15:45&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ronen_Bachar|Automated Crawling &amp;amp; Security Analysis of Flash/Flex based Web Applications]] ([[Media:OWASP_IL_2008_Ronen_Bachar_RIA.ppt‎|download ppt]])&amp;lt;BR&amp;gt;Ronen Bachar, IBM&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; | [[OWASP_Israel_2008_Conference_Ohad_Ben_Cohen|Korset: Code-based Intrusion Detection System for Linux]] ([[Media:OWASP_IL_2008_Ohad_Ben_Cohen_Korset.pdf|download pdf]])&amp;lt;BR&amp;gt;Ohad Ben-Cohen&lt;br /&gt;
&lt;br /&gt;
|- style=&amp;quot;font-size:11pt&amp;quot;&lt;br /&gt;
|style=&amp;quot;color:#1F497D&amp;quot; height=&amp;quot;30&amp;quot; align=&amp;quot;right&amp;quot; valign=&amp;quot;top&amp;quot; | 15:45-16:30&lt;br /&gt;
|  valign=&amp;quot;top&amp;quot; colspan=&amp;quot;2&amp;quot; | Turbo talks (Rump Session), Currently scheduled presentations: &lt;br /&gt;
* Yossi Oren, Automatic Patch-Based Exploit Generation (APEG) ([[Media:OWASP_IL_2008_Yossi_Oren_APEG.ppt|download ppt]])&lt;br /&gt;
* Avi Weissman, Introduction to the Israeli Forum for Information Security (ISIF)&lt;br /&gt;
* Robert Moskovitch, Detection of Unknown Malicious Code via Machine Learning ([[Media:UnknownMalcodeDetection_OWASP-IL-08.pdf|download pdf]])&lt;br /&gt;
* Yaniv Miron, Comsec, UTF7 XSS ([[Media:OWASP_IL_2008_Yaniv_Miron_UTF7_XSS.ppt|download ppt]])&lt;br /&gt;
* Shay Zalalichin &amp;amp; Avi Douglen, Comsec, Breaking CAPTCHA Myths ([[Media:2008-09-14_OWASP_Israel_2008.ppt‎|download ppt]])&lt;br /&gt;
&lt;br /&gt;
'''Closing Words, Ofer Shezaf'''&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
== The people behind the conference ==&lt;br /&gt;
&lt;br /&gt;
OWASP Israel is made by the people who contribute their time and brain to its success. The following people are working to ensure that OWASP Israel 2008 is a success.&lt;br /&gt;
&lt;br /&gt;
If you feel that you also can contribute or have interesting ideas regarding the conference, don't hesitate to contact me.&lt;br /&gt;
&lt;br /&gt;
=== Steering Committee ===&lt;br /&gt;
&lt;br /&gt;
The steering committee includes prominent individuals in the field of information security and help set the program for the conference:&lt;br /&gt;
&lt;br /&gt;
* Adi Sharabani (IBM)&lt;br /&gt;
* Dr. David Movshovitz (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Ofer Maor (Hacktics)&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
* Ory Segal (IBM)&lt;br /&gt;
* Shay Zalalichin (ComSec)&lt;br /&gt;
* Yossi Oren (Proxy Software Systems)&lt;br /&gt;
&lt;br /&gt;
=== Organization Committee ===&lt;br /&gt;
&lt;br /&gt;
The organization committee is in charge of making this all happen:&lt;br /&gt;
&lt;br /&gt;
* Dr. Anat Bremler-Barr (Interdisciplinary Center Herzliya)&lt;br /&gt;
* Neer Roggel, the technion&lt;br /&gt;
* Shay Shuker&lt;br /&gt;
* Ofer Shezaf (Breach Security)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
~ [[User:Oshezaf|Ofer Shezaf]],Conference Chair&amp;lt;br/&amp;gt;&lt;br /&gt;
&amp;lt;small&amp;gt;[mailto:ofer@shezaf.com ofer@shezaf.com]&amp;lt;/small&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Israel 2008]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:OWASP_Israel_2008-Ristic-Shezaf-ModProfiler.pdf&amp;diff=40829</id>
		<title>File:OWASP Israel 2008-Ristic-Shezaf-ModProfiler.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:OWASP_Israel_2008-Ristic-Shezaf-ModProfiler.pdf&amp;diff=40829"/>
				<updated>2008-09-22T16:04:27Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=39431</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=39431"/>
				<updated>2008-09-12T09:58:16Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG, 39th Floor, One Canada Sq, E14 5AG, starting at '''6.30pm''' (arrive between 6.00pm and 6.30pm), ending by 8.30pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: SQL Injection Worms for Fun and Profit'''&lt;br /&gt;
&lt;br /&gt;
Earlier this year the first (publicly known) SQL Injection worm&lt;br /&gt;
appeared. This worm used SQL Injection to insert malicious scripting&lt;br /&gt;
tags into the pages of over 90,000 sites that were vulnerable to SQL&lt;br /&gt;
injection.&lt;br /&gt;
&lt;br /&gt;
Yet the exploit vector was fairly innocuous, easy to clean up, and easy&lt;br /&gt;
to block. In other words, very much version 0.1 of what a SQL Injection&lt;br /&gt;
worm can achieve.&lt;br /&gt;
&lt;br /&gt;
This talk is going to discuss how far the rabbit hole can go with SQL&lt;br /&gt;
injection based worms, including full compromise of the server OS, and&lt;br /&gt;
why we should be worried by what is going to be coming next out of&lt;br /&gt;
Russia/China/wherever, including a live demo of a proof of concept SQL&lt;br /&gt;
injection worm, &amp;quot;weaponized&amp;quot;.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Justin Clarke: Protecting Vulnerable Applications with IIS7'''&lt;br /&gt;
&lt;br /&gt;
With the advent of IIS7 and its modular design, Microsoft has provided&lt;br /&gt;
the ability to easily integrate custom ASP.NET HttpModules into the IIS7&lt;br /&gt;
request-handling pipeline. This session will present an IIS7 module&lt;br /&gt;
designed to leverage this architecture to actively and dynamically&lt;br /&gt;
protect web applications from attack. With minimal configuration, the&lt;br /&gt;
module can be used to protect virtually any application running on the&lt;br /&gt;
web server, including non-ASP.NET applications (such as those written in&lt;br /&gt;
PHP, Cold Fusion, or classic ASP).&lt;br /&gt;
&lt;br /&gt;
This presentation will outline the overall design and architecture of&lt;br /&gt;
the module, including a detailed explanation of available features and&lt;br /&gt;
attack defense techniques. The session will focus on live demonstrations&lt;br /&gt;
of how the module can easily be installed to protect already-deployed&lt;br /&gt;
applications and how it can block both traditional web application&lt;br /&gt;
attacks, such as SQL injection and Cross-Site Scripting, and&lt;br /&gt;
application-specific vulnerabilities like parameter manipulation and&lt;br /&gt;
authorization attacks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''About Justin:'''&lt;br /&gt;
&lt;br /&gt;
Justin is a Principal Consultant with Gotham Digital Science. He is the&lt;br /&gt;
co-author of &amp;quot;Network Security Tools&amp;quot; (O'Reilly, 2005), a contributing&lt;br /&gt;
author to &amp;quot;Network Security Assessment&amp;quot; (O'Reilly, 2007), and has spoken&lt;br /&gt;
at Blackhat, EuSecWest, RSA, and OSCON in the past. He has over 10 years&lt;br /&gt;
of security testing and consulting experience in network, application,&lt;br /&gt;
source code and wireless testing work for some of the largest commercial&lt;br /&gt;
and government organizations in the United States, United Kingdom, and&lt;br /&gt;
New Zealand. Justin is active in developing security tools for&lt;br /&gt;
penetrating and defending applications, servers, and wireless networks&lt;br /&gt;
(e.g. SQLBrute), and as a compulsive tinkerer he can't leave anything&lt;br /&gt;
alone without at least trying to see how it works.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks and snacks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=39424</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=39424"/>
				<updated>2008-09-12T09:47:10Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th''' - '''TO BE CONFIRMED'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks and snacks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38949</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38949"/>
				<updated>2008-09-09T11:32:43Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th''' - '''TO BE CONFIRMED'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''' ([https://www.owasp.org/images/f/f4/DirBuster_OWASP-London_September-2008.pdf PDF])&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: JBroFuzz'''&lt;br /&gt;
&lt;br /&gt;
[Summary will be updated if I get it from Yiannis, but you can always go to the [http://www.owasp.org/index.php/Category:OWASP_JBroFuzz JBroFuzz project homepage] for more information.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:DirBuster_OWASP-London_September-2008.pdf&amp;diff=38948</id>
		<title>File:DirBuster OWASP-London September-2008.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:DirBuster_OWASP-London_September-2008.pdf&amp;diff=38948"/>
				<updated>2008-09-09T11:30:18Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38947</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38947"/>
				<updated>2008-09-09T11:28:52Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th''' - '''TO BE CONFIRMED'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond'''&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: Web Authentication Combining Single Packet Authorization (WACSPA)'''&lt;br /&gt;
&lt;br /&gt;
This presentation aims to demonstrate a pioneering way of authenticating on a web-site, by means of accessing the login interface via port knocking.&lt;br /&gt;
&lt;br /&gt;
As Single Packet Authorization is beginning to mature as a subject discipline, attaching a time window of opportunity towards the ability of logging in to a web-site adds an extra layer of security, well beyond the remit of the application layer.&lt;br /&gt;
&lt;br /&gt;
In this presentation, the basic concept will be presented, a system description given, as well as a detailed outline of the tools used to develop this type of web authentication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38946</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38946"/>
				<updated>2008-09-09T11:28:36Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Past Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th''' '''TO BE CONFIRMED'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond'''&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: Web Authentication Combining Single Packet Authorization (WACSPA)'''&lt;br /&gt;
&lt;br /&gt;
This presentation aims to demonstrate a pioneering way of authenticating on a web-site, by means of accessing the login interface via port knocking.&lt;br /&gt;
&lt;br /&gt;
As Single Packet Authorization is beginning to mature as a subject discipline, attaching a time window of opportunity towards the ability of logging in to a web-site adds an extra layer of security, well beyond the remit of the application layer.&lt;br /&gt;
&lt;br /&gt;
In this presentation, the basic concept will be presented, a system description given, as well as a detailed outline of the tools used to develop this type of web authentication.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38945</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38945"/>
				<updated>2008-09-09T11:28:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 4th''' '''TO BE CONFIRMED'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38151</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38151"/>
				<updated>2008-09-03T11:13:42Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided. '''IMPORTANT: You must RSVP if you want to attend.'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond'''&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: Web Authentication Combining Single Packet Authorization (WACSPA)'''&lt;br /&gt;
&lt;br /&gt;
This presentation aims to demonstrate a pioneering way of authenticating on a web-site, by means of accessing the login interface via port knocking.&lt;br /&gt;
&lt;br /&gt;
As Single Packet Authorization is beginning to mature as a subject discipline, attaching a time window of opportunity towards the ability of logging in to a web-site adds an extra layer of security, well beyond the remit of the application layer.&lt;br /&gt;
&lt;br /&gt;
In this presentation, the basic concept will be presented, a system description given, as well as a detailed outline of the tools used to develop this type of web authentication.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38150</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38150"/>
				<updated>2008-09-03T11:12:30Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond'''&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
'''Yiannis Pavlosoglou: Web Authentication Combining Single Packet Authorization (WACSPA)'''&lt;br /&gt;
&lt;br /&gt;
This presentation aims to demonstrate a pioneering way of authenticating on a web-site, by means of accessing the login interface via port knocking.&lt;br /&gt;
&lt;br /&gt;
As Single Packet Authorization is beginning to mature as a subject discipline, attaching a time window of opportunity towards the ability of logging in to a web-site adds an extra layer of security, well beyond the remit of the application layer.&lt;br /&gt;
&lt;br /&gt;
In this presentation, the basic concept will be presented, a system description given, as well as a detailed outline of the tools used to develop this type of web authentication.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38149</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38149"/>
				<updated>2008-09-03T11:12:15Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''''&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
''''Yiannis Pavlosoglou: Web Authentication Combining Single Packet Authorization (WACSPA)'''&lt;br /&gt;
&lt;br /&gt;
This presentation aims to demonstrate a pioneering way of authenticating on a web-site, by means of accessing the login interface via port knocking.&lt;br /&gt;
&lt;br /&gt;
As Single Packet Authorization is beginning to mature as a subject discipline, attaching a time window of opportunity towards the ability of logging in to a web-site adds an extra layer of security, well beyond the remit of the application layer.&lt;br /&gt;
&lt;br /&gt;
In this presentation, the basic concept will be presented, a system description given, as well as a detailed outline of the tools used to develop this type of web authentication.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38148</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38148"/>
				<updated>2008-09-03T11:12:00Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''James Fisher: DirBuster &amp;amp; Beyond''''&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
''''Yiannis Pavlosoglou: Web Authentication Combining Single Packet Authorization (WACSPA)'''&lt;br /&gt;
&lt;br /&gt;
This presentation aims to demonstrate a pioneering way of authenticating on a web-site, by means of accessing the login interface via port knocking.&lt;br /&gt;
&lt;br /&gt;
As Single Packet Authorization is beginning to mature as a subject discipline, attaching a time window of opportunity towards the ability of logging in to a web-site adds an extra layer of security, well beyond the remit of the application layer.&lt;br /&gt;
&lt;br /&gt;
In this presentation, the basic concept will be presented, a system description given, as well as a detailed outline of the tools used to develop this type of web authentication.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38147</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38147"/>
				<updated>2008-09-03T11:11:39Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
James Fisher: DirBuster &amp;amp; Beyond&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
Yiannis Pavlosoglou: Web Authentication Combining Single Packet Authorization (WACSPA)&lt;br /&gt;
&lt;br /&gt;
This presentation aims to demonstrate a pioneering way of authenticating on a web-site, by means of accessing the login interface via port knocking.&lt;br /&gt;
&lt;br /&gt;
As Single Packet Authorization is beginning to mature as a subject discipline, attaching a time window of opportunity towards the ability of logging in to a web-site adds an extra layer of security, well beyond the remit of the application layer.&lt;br /&gt;
&lt;br /&gt;
In this presentation, the basic concept will be presented, a system description given, as well as a detailed outline of the tools used to develop this type of web authentication.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38146</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38146"/>
				<updated>2008-09-03T11:11:13Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm), ending by 9pm. KMPG are sponsoring the meeting. Complementary drinks will be provided.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
&lt;br /&gt;
James Fisher: DirBuster &amp;amp; Beyond&lt;br /&gt;
&lt;br /&gt;
An introduction to the DirBuster project, detailing how it works, what it can do for you, and the direction it will be taking in the future. Followed by an introduction to my unreleased project FuzzBuster, showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
Yiannis Pavlosoglou: Web Authentication Combining Single Packet Authorization (WACSPA)&lt;br /&gt;
&lt;br /&gt;
This presentation aims to demonstrate a pioneering way of authenticating on a web-site, by means of accessing the login interface via port knocking.&lt;br /&gt;
&lt;br /&gt;
As Single Packet Authorization is beginning to mature as a subject discipline, attaching a time window of opportunity towards the ability of logging in to a web-site adds an extra layer of security, well beyond the remit of the application layer.&lt;br /&gt;
&lt;br /&gt;
In this presentation, the basic concept will be presented, a system description given, as well as a detailed outline of the tools used to develop this type of web authentication.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=London&amp;diff=38145</id>
		<title>London</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=London&amp;diff=38145"/>
				<updated>2008-09-03T11:10:05Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* Future Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=London|extra=The chapter leader is Ivan Ristic (since Apr 2007)|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-london|emailarchives=http://lists.owasp.org/pipermail/owasp-london}}&lt;br /&gt;
&lt;br /&gt;
== Future Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, September 4th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': KPMG 39th Floor, One Canada Sq, E14 5AG, starting at 7pm (arrive between 6.30pm and 7pm). KMPG are sponsoring the meeting. Complementary drinks will be provided.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
&lt;br /&gt;
1 James Fisher: DirBuster &amp;amp; Beyond&lt;br /&gt;
&lt;br /&gt;
  An introduction to the DirBuster project, detailing how it works, what&lt;br /&gt;
  it can do for you, and the direction it will be taking in the future.&lt;br /&gt;
  Followed by an introduction to my unreleased project FuzzBuster,&lt;br /&gt;
  showing why it's different to other HTTP fuzzes out there.&lt;br /&gt;
&lt;br /&gt;
  DirBuster is a popular OWASP project:&lt;br /&gt;
&lt;br /&gt;
  http://www.owasp.org/index.php/Category:OWASP_DirBuster_Project&lt;br /&gt;
&lt;br /&gt;
2 Yiannis Pavlosoglou: Web Authentication Combining Single Packet&lt;br /&gt;
  Authorization (WACSPA)&lt;br /&gt;
&lt;br /&gt;
  This presentation aims to demonstrate a pioneering way of&lt;br /&gt;
  authenticating on a web-site, by means of accessing the login&lt;br /&gt;
  interface via port knocking.&lt;br /&gt;
&lt;br /&gt;
  As Single Packet Authorization is beginning to mature as a subject &lt;br /&gt;
  discipline, attaching a time window of opportunity towards the&lt;br /&gt;
  ability of logging in to a web-site adds an extra layer of security,&lt;br /&gt;
  well beyond the remit of the application layer.&lt;br /&gt;
&lt;br /&gt;
  In this presentation, the basic concept will be presented, a system&lt;br /&gt;
  description given, as well as a detailed outline of the tools used to&lt;br /&gt;
  develop this type of web authentication.&lt;br /&gt;
&lt;br /&gt;
== Past Events ==&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, July 24th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18:30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19:00 Dinis Cruz: What is going on at OWASP?&lt;br /&gt;
** 19:20 Colin Watson: Nominet Best Practices Award briefing ([https://www.owasp.org/images/6/69/Owasp-london-bestpractice2008.pdf PDF])&lt;br /&gt;
** 19:45 Dennis Hurst:  AJAX / Web 2.0 / WebServices security concerns ([https://www.owasp.org/images/9/90/Testing_Finance_2_June_2008.pdf PDF])&lt;br /&gt;
** 20:30 Dinis Cruz: Building a tool for Security consultants: A story of a customized source code scanner&lt;br /&gt;
** 21:15 Ivan Ristic: Evaluation Criteria for Web Application Firewalls ([http://www.owasp.org/images/f/f4/AppSecEU08_Evaluation_Criteria_for_Web_Application_Firewalls.pdf PDF]) (talk from the recent OWASP AppSec Europe conference in Ghent).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, April 3rd'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] is sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://www.withdk.com/archives/PHP%20Code%20Analysis-%20Real%20World%20Examples.pdf PHP Code Analysis: Real World Examples] (David Kierznowski) &lt;br /&gt;
** 20h00 [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse_attacks.pdf Abusing PHP sockets for fun and profit] (Rodrigo Marcos; also available: [http://www.secforce.co.uk/research/socket_reuse/socket_attack.zip source code], [http://www.secforce.co.uk/research/socket_reuse/PHP_socket_reuse.html Flash demo]) &lt;br /&gt;
** 20h45 Web Application Security Badges (Colin Watson) &lt;br /&gt;
** 21h00 Discussion: OWASP [http://www.nic.uk/about/bestpracticechallenge/ Best Practice Challenge 2008 nomination].&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday, December 6th'''&lt;br /&gt;
&lt;br /&gt;
** '''Location''': Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsoring the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
** '''Programme'''&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 Adrian Pastor: Cracking into embedded devices and beyond! ([[Media:Cracking-into-embedded-devices-and-beyond.pdf]])&lt;br /&gt;
** 19h45 Rodrigo Marcos: Blind SQL Injection: Optimization Techniques ([http://www.gnucitizen.org/blog/security-and-hacking-scene-in-london/BlindSQLinjection.ppt PPT]).&lt;br /&gt;
** 20h15 OWASP London Chapter (discussion).&lt;br /&gt;
** 20h45 PDP: Client-Side Security (discussion).&lt;br /&gt;
** 21h30 End.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Wednesday, September 5th''' (participating in the [[OWASP Day]] event). Read meeting notes [https://lists.owasp.org/pipermail/owasp-london/2007-September/000187.html here].&lt;br /&gt;
** Location: Auriol Kensington Rowing Club ([http://www.akrowing.com/page.php?page=findus map]), starting at 7pm (arrive between 6.30pm and 7pm). [http://www.breach.com Breach Security] sponsored the meeting by paying for the costs of the venue.&lt;br /&gt;
&lt;br /&gt;
* '''Programme''':&lt;br /&gt;
** 18h30 Arrive and make yourselves comfortable.&lt;br /&gt;
** 19h00 [http://gnucitizen.org/about/pdp Petko D. Petkov], a.k.a pdp (architect), founder of the [http://gnucitizen.org GNUCITIZEN] group: [http://www.owasp.org/index.php/Belgium#For_my_next_trick..._hacking_Web2.0_.28pdp.29 For my next trick... hacking Web2.0].&lt;br /&gt;
** 20h00 Discussion: &amp;quot;Privacy in the 21st Century?&amp;quot;, moderator: Ivan Ristic.&lt;br /&gt;
** 21h00 Discussion: &amp;quot;Future of the OWASP London Chapter&amp;quot;.&lt;br /&gt;
** 21h30 End&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd March'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** [[Mark O'Neill]] &amp;quot;Security Vulnerabilities in AJAX and Web 2.0&amp;quot; - 60 m&lt;br /&gt;
** [[Dinis Cruz]] &amp;quot;OWASP Spring of Code and Owasp world update &amp;quot; - 30 m&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Thursday 22nd February'''&lt;br /&gt;
** Location: The Water Poet Pub, Liverpool St, London [http://www.beerintheevening.com/cgi-bin/map_link.cgi?id=17986&amp;amp;type=8 map] , [http://www.beerintheevening.com/pubs/s/17/17986/Water_Poet/Shoreditch description]&lt;br /&gt;
** We are going to use the downstairs room which you can access from the back of the pub &lt;br /&gt;
* '''Presentations''':&lt;br /&gt;
** by '''Dinis Cruz (Chief OWASP Evangelist)''' :&lt;br /&gt;
*** '''OWASP, the Open Web Application Security Project''' 30m - The Open Web Application Security Project (OWASP) is an open community dedicated to enabling organizations to develop, purchase, and maintain applications that can be trusted. All of the OWASP tools, documents, blogs, and chapters are free and open to anyone interested in improving application security. In this presentation Dinis will show the latest guides and tools from OWASP which should be part of every company's security efforts.&lt;br /&gt;
*** '''Buffer Overflows on .Net and Asp.Net''' 30m - One of the common myths about the .Net Framework is that it is immune to Buffer Overflows. Although this might be correct in pure managed and verifiable .Net code, large percentage of .Net and Asp.Net applications code is unmanaged code. In this talk Dinis will show the areas in .Net and Asp.Net applications that are vulnerable to Buffer Overflows (including the demo of a .Net Buffer Overflow Fuzzer).&lt;br /&gt;
*** '''0wning Vista's userland - The CAS / UAC missed opportunity , and what I think MS should had done''' - In this presentation Dinis will explore the missed opportunity by Microsoft to use technologies like .Net's CAS (Code Access Security) and Vista's UAC (User Access Control) to create secure and trustworthy userland environments that protect the user's assets. In the hope that might make a small difference, ideas and solutions for the future will also be presented.&lt;br /&gt;
** by '''Ivan Ristic''': &lt;br /&gt;
*** '''ModSecurity'''  - 30m&lt;br /&gt;
&lt;br /&gt;
* '''Schedule''':&lt;br /&gt;
** 6pm - 7pm arrive and grab a drink&lt;br /&gt;
** 7:00 - '''OWASP, the Open Web Application Security Project''', Dinis Cruz&lt;br /&gt;
** 7:45 - '''ModSecurity''', Ivan Ristic&lt;br /&gt;
** 8:15 - '''Buffer Overflows on .Net and Asp.Net''', Dinis Cruz&lt;br /&gt;
** 8:50 -  0wning Vista's userland - The CAS / UAC missed opportunity, and what I think MS should had done, Dinis Cruz&lt;br /&gt;
** 9:00 - Dinner&lt;br /&gt;
&lt;br /&gt;
[[Category:United Kingdom]]&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Securing_WebGoat_using_ModSecurity_-_50_Review_-_First_Reviewer_-_C&amp;diff=37481</id>
		<title>Project Information:template Securing WebGoat using ModSecurity - 50 Review - First Reviewer - C</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Securing_WebGoat_using_ModSecurity_-_50_Review_-_First_Reviewer_-_C&amp;diff=37481"/>
				<updated>2008-08-28T14:31:47Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Securing WebGoat using ModSecurity|Click here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|OWASP Securing WebGoat using ModSecurity Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The work done so far is of very high quality. Consistent, thorough, and methodical. We (Ryan and Ivan (writing)) are thrilled that this body of work will both serve the ModSecurity users and serve as an experiment of the usefulness and maturity of ModSecurity itself. Furthermore, we are hoping the project will uncover the rough edges and usability issues that need improving.&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Over 50%.&lt;br /&gt;
 |- &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Securing_WebGoat_using_ModSecurity_-_50_Review_-_First_Reviewer_-_C&amp;diff=37480</id>
		<title>Project Information:template Securing WebGoat using ModSecurity - 50 Review - First Reviewer - C</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Securing_WebGoat_using_ModSecurity_-_50_Review_-_First_Reviewer_-_C&amp;diff=37480"/>
				<updated>2008-08-28T14:29:54Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Project Information:template Securing WebGoat using ModSecurity|Click here to return to the previous page]].&lt;br /&gt;
&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;3&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''50% REVIEW PROCESS''' &lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
Project Deliveries &amp;amp; Objectives  &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
[[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|OWASP Securing WebGoat using ModSecurity Project's Deliveries &amp;amp; Objectives]]&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25x%; background:#4058A0&amp;quot; align=&amp;quot;center&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''QUESTIONS''' &lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#4058A0&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''ANSWERS'''  &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
1. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|'''the assumed ones''']], please exemplify writing down those of them that haven't been realised.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
 |- &lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| &lt;br /&gt;
&lt;br /&gt;
2. At what extent have the project deliveries &amp;amp; objectives been accomplished?  Having in consideration [[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|'''the assumed ones''']], please quantify in terms of percentage.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Over 50%.&lt;br /&gt;
 |- &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
3. Please do use the right hand side column to provide advice and make work suggestions.&lt;br /&gt;
 | colspan=&amp;quot;2&amp;quot; style=&amp;quot;width:75%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Project_Information:template_Securing_WebGoat_using_ModSecurity&amp;diff=37479</id>
		<title>Project Information:template Securing WebGoat using ModSecurity</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Project_Information:template_Securing_WebGoat_using_ModSecurity&amp;diff=37479"/>
				<updated>2008-08-28T14:27:46Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;7&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT IDENTIFICATION''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Project Name'''&lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''OWASP Securing WebGoat using ModSecurity Project''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Short Project Description''' &lt;br /&gt;
 | colspan=&amp;quot;6&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|The purpose of this project is to create custom Modsecurity rulesets that, in addition to the Core Set, will protect WebGoat 5.1 from as many of its vulnerabilities as possible (the goal is 90%) without changing one line of source code. To ensure that it will be a complete 'no touch' on WebGoat and its environment, ModSecurity will be configured on Apache server as a remote proxy server. For those vulnerabilities that cannot be prevented (partially or not at all), I will document my efforts in attempting to protect them. Business logic vulnerabilities will be particularly challenging to solve.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Email Contacts'''&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Leader&amp;lt;br&amp;gt;[mailto:stephencraig.evans(at)gmail.com '''Stephen Evans''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Project Contributors&amp;lt;br&amp;gt;(if applicable)&amp;lt;br&amp;gt;[mailto:name(at)name '''Name&amp;amp;Email''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[https://lists.owasp.org/mailman/listinfo/owasp-webgoat-using-modsecurity '''Mailing List/Subscribe''']&amp;lt;br&amp;gt;[mailto:Owasp-WebGoat-using-ModSecurity(at)lists.owasp.org '''Mailing List/Use''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|First Reviewer&amp;lt;br&amp;gt;[mailto:ivan.ristic@breach.com '''Ivan Ristic &amp;amp;&amp;lt;br&amp;gt;Breach Group''']&lt;br /&gt;
 | style=&amp;quot;width:14%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Second Reviewer&amp;lt;br&amp;gt;[mailto:christian.folini(at)netnea.com '''Christian Folini''']&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Board Member&amp;lt;br&amp;gt;'''X'''&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''PROJECT MAIN LINKS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
* [[:OWASP Securing WebGoat using ModSecurity Project|Main project page]]&lt;br /&gt;
* [[:OWASP ModSecurity Securing WebGoat Section4 Sublesson 04.2|Section 4, Mitigating the WebGoat lessons]] &lt;br /&gt;
*(If appropriate, links to be added)&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''RELATED PROJECTS''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:100%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
[[:Category:OWASP WebGoat Project|OWASP WebGoat Project]]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;6&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''SPONSORS &amp;amp; GUIDELINES''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008|Sponsor - '''OWASP Summer of Code 2008''']] &lt;br /&gt;
 | style=&amp;quot;width:50%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|[[OWASP Summer of Code 2008 Applications#Securing WebGoat using ModSecurity|'''Sponsored Project/Guidelines/Roadmap''']]&lt;br /&gt;
 |}&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;5&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|ASSESSMENT AND REVIEW PROCESS&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#6C82B5&amp;quot; align=&amp;quot;center&amp;quot;|'''Review/Reviewer''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Author's Self Evaluation'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further) &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''First Reviewer'''&amp;lt;br&amp;gt;(applicable for Alpha Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''Second Reviewer'''&amp;lt;br&amp;gt;(applicable for Beta Quality &amp;amp; further)&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#b3b3b3&amp;quot; align=&amp;quot;center&amp;quot;|'''OWASP Board Member'''&amp;lt;br&amp;gt;(applicable just for Release Quality) &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''50% Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity - 50 Review - Self Evaluation - A|See&amp;amp;Edit:50% Review/Self-Evaluation (A)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes'''&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity - 50 Review - First Reviewer - C|See&amp;amp;Edit: 50% Review/1st Reviewer (C)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity 50 Review Second Review E|See&amp;amp;Edit: 50%Review/2nd Reviewer (E)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:15%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Final Review''' &lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity - Final Review - Self Evaluation - B|See&amp;amp;Edit: Final Review/SelfEvaluation (B)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity - Final Review - First Reviewer - D|See&amp;amp;Edit: Final Review/1st Reviewer (D)]]&lt;br /&gt;
 | style=&amp;quot;width:21%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|Objectives &amp;amp; Deliveries reached?&amp;lt;br&amp;gt;'''Yes/No''' (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;Which status has been reached?&amp;lt;br&amp;gt;'''Season of Code''' - (To update)&amp;lt;br&amp;gt;---------&amp;lt;br&amp;gt;[[Project Information:template Securing WebGoat using ModSecurity - Final Review - Second Reviewer - F|See&amp;amp;Edit: Final Review/2nd Reviewer (F)]]&lt;br /&gt;
 | style=&amp;quot;width:22%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot;|X&lt;br /&gt;
 |-&lt;br /&gt;
 |}&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=37275</id>
		<title>OWASP NYC AppSec 2008 Conference</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_NYC_AppSec_2008_Conference&amp;diff=37275"/>
				<updated>2008-08-26T15:01:48Z</updated>
		
		<summary type="html">&lt;p&gt;Ivanr: /* 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= 2008 OWASP USA, NYC =&lt;br /&gt;
Last Update: {{REVISIONMONTH}}/{{REVISIONDAY}}/{{REVISIONYEAR}}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt; Scroll down to see speaker agenda, and training options &amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/6/61/Banner2_irfan.jpg]&amp;lt;/center&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Diamond Sponsor] - [http://www.imperva.com http://www.owasp.org/images/d/de/Imperva_2color_RGB.jpg]&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Platinum Sponsor]  - [http://www.cenzic.com https://www.owasp.org/images/b/bf/CenzicLogo_RGB.gif]  - [http://www.whitehatsec.com http://www.owasp.org/images/archive/4/4d/20080703021901%21Whitehat.gif] -  [http://www-935.ibm.com/services/us/gbs/app/html/gbs_applicationservices.html?cm_re=masthead-_-business-_-apps-allappserv https://www.owasp.org/images/4/47/Ibm.jpg] &amp;lt;/center&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
[http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Gold, Silver &amp;amp; Other Sponsors] - [http://www.isc2.org http://www.owasp.org/images/4/45/Isc2logo.gif] - [http://www.f5.com http://www.owasp.org/images/7/7e/50px-F5_50px.jpg] - [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif] - [http://www.foundstone.com/us/education-overview.asp http://www.owasp.org/images/2/26/Foundstone.jpg] - [http://www.qualys.com https://www.owasp.org/images/a/ae/Qualys.gif] - [http://www.ouncelabs.com https://www.owasp.org/images/6/6e/OunceLabs_logo.jpg] - [http://www.fortify.com https://www.owasp.org/images/a/ac/Fortify.jpg] - [http://www.cigital.com/ https://www.owasp.org/images/b/be/Cigital_OWASP.GIF] - [http://www.acunetix.com https://www.owasp.org/images/e/eb/Acuneti.gif] - [http://www.accessitgroup.com https://www.owasp.org/images/6/6d/Accessit.JPG] - &lt;br /&gt;
[http://www.fishnetsecurity.com https://www.owasp.org/images/4/4a/Fishnet_security.png] - [http://www.arctecgroup.net http://www.owasp.org/images/b/bf/Arctec.jpg] - [http://www.airtightnetworks.net https://www.owasp.org/images/8/8b/Airtight.gif] - &lt;br /&gt;
[http://www.artofdefence.com https://www.owasp.org/images/d/dc/AOD_Logo.gif] - &lt;br /&gt;
[http://www.securityuniversity.net https://www.owasp.org/images/0/0d/Security_university.jpg] - &lt;br /&gt;
[http://www.breach.com https://www.owasp.org/images/9/9c/Breach_logo.gif] - [http://www.armorize.com https://www.owasp.org/images/c/ce/Armorize_Logo.png] -[http://www.barracudanetworks.com/ https://www.owasp.org/images/a/a2/Barracuda_Color_Logo.jpg] ~ [http://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf http://www.owasp.org/images/f/f8/Sponsorsm.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;center&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities] -- [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-PRESS Press Registration] -- [http://www.owasp.org/index.php/Member_Offers Other OWASP Member Offers] &amp;lt;/center&amp;gt; &lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
With assistance from: [http://www.webappsec.org WASC], [http://www.nym-infragard.us NYM InfraGard], [http://aitglobal.com AITGlobal], [http://nyphp.org/index.php NYC PHP], [http://www.nycbug.org NYCBUG], [http://www.isacany.net NYC ISACA], [http://www.nymissa.org NYC ISSA] and [http://www.pace.edu Pace University] you're invited to (2) days of Seminars and Technology Pavilion from the world's best application security technology minds, (2) days of hardcore hands-on training, all held at &amp;lt;b&amp;gt;[http://www.pace.edu/page.cfm?doc_id=16157 Pace University]&amp;lt;/b&amp;gt;, located in downtown New York City at &amp;lt;b&amp;gt;One Pace Plaza New York, NY 10038.&amp;lt;/b&amp;gt; Event Fees: $350 Members / $400 Non-Members / $200 for Students.  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#OWASP_NYC_AppSec_2008_Training_Courses_-_September_22nd_and_23rd.2C_2008 2 days of hands on training classes] are also available.&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;/center&amp;gt;&lt;br /&gt;
OWASP NYC's conference offers tracks for security and development professionals interested in learning how to secure applications and enterprises as well as organization leaders who want to learn more about the state of the appsec industry and its trends.  With two days of training and two days of sessions discussing cutting edge research presented by some of the brightest people in the industry, this event is a must attend for anyone looking to improve their information security posture. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== 2008 OWASP USA, NYC Conference Schedule – Sept 24th - Sept 25th ==&lt;br /&gt;
&amp;lt;center&amp;gt;[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/speakeragreement OWASP Speaker Agreement]&amp;lt;/center&amp;gt;&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;4&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 1 – Sept 24th, 2008 &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | || style=&amp;quot;width:30%; background:#BC857A&amp;quot; | Track 1: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; | Track 2: &lt;br /&gt;
 | style=&amp;quot;width:30%; background:#99FF99&amp;quot; | Track 3: &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 07:30-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | '''Doors Open for Attendee/Speaker Registration &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference#Technology_Pavilion_-_September_24th_and_25th Exhibit/Sponsor Area]'''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Version 3.0 who we are, where we are.. where we are going &lt;br /&gt;
''OWASP Foundation: [http://www.owasp.org/index.php/Contact Jeff Williams], [http://www.owasp.org/index.php/Contact Dinis Cruz], [http://www.owasp.org/index.php/Contact Dave Wichers], [http://www.linkedin.com/in/tombrennan Tom Brennan], [http://www.owasp.org/index.php/Contact Sebastien Deleersnyder], [http://www.owasp.org/index.php/Contact Paulo Coimbra], [http://www.owasp.org/index.php/Contact Kate Hartmann], [http://www.owasp.org/index.php/Contact Alison Shrader] &amp;amp; [http://www.owasp.org/index.php/Category:OWASP_Chapter#Chapter_Support_Materials all local chapter leaders]&lt;br /&gt;
'' &lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |  [http://www.owasp.org/index.php/AppSecEU08_Trends_in_Web_Hacking_Incidents:_What%27s_hot_for_2008 Analysis of the Web Hacking Incidents Database (WHID)]&lt;br /&gt;
''[http://blog.shezaf.com Ofer Shezaf]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.webappsecroadmap.com Web Application Security Road Map]  &amp;lt;br&amp;gt;&lt;br /&gt;
''[http://joesecurity.blogspot.com Joe White]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[https://buildsecurityin.us-cert.gov/swa/acqwg.html DHS Software Assurance Initiatives]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/ab/3b7 Stan Wisseman] &amp;amp; [http://www.linkedin.com/pub/1/439/923 Joe Jarzombek]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Web Security Education using Open Source Tools&lt;br /&gt;
''Prof. Li-Chiou Chen &amp;amp; Chienitng Lin, [http://www.pace.edu/page.cfm?doc_id=16399 Pace Univ]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Http Bot Research&lt;br /&gt;
''[http://www.shadowserver.org/wiki/pmwiki.php?n=Shadowserver.Mission Andre M. DiMino - ShadowServer Foundation]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | MalSpam Research &lt;br /&gt;
'' [http://www.knujon.com/bios.html Garth Bruen]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Sign-Up&lt;br /&gt;
''LUNCH - Provided by event sponsors @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:30 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Cross-Site Scripting Filter Evasion&lt;br /&gt;
''Alexios Fakos''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Framework-level Threat Analysis: Adding Science to the Art of Source-code review&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-rohit-sethi Rohit Sethi] &amp;amp; [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-sahba-kazerooni Sahba Kazerooni]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Automated Web-based Malware Behavioral Analysis &lt;br /&gt;
''[http://www.linkedin.com/pub/3/359/b1a Tyler Hudak]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Testing Guide - Offensive Assessing Financial Applications&lt;br /&gt;
'' [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-daniel-cuthbert Daniel Cuthbert]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | WAF ModSecurity&lt;br /&gt;
''[http://www.breach.com/company/executive-team/ Ivan Ristic]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Using Layer 8 and OWASP to Secure Web Applications&lt;br /&gt;
''[http://www.linkedin.com/in/davidstern2000 David Stern] &amp;amp; [http://www.linkedin.com/in/romangarber Roman Garber]''&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Critical exploits... let us count the ways&lt;br /&gt;
''[http://jeremiahgrossman.blogspot.com Jeremiah Grossman] &amp;amp; [http://ha.ckers.org/blog/about Robert &amp;quot;RSnake&amp;quot; Hansen],''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Testing Guide - Reverse Engineering .NET &lt;br /&gt;
''[http://www.linkedin.com/in/adamboulton Adam Boulton]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | JBroFuzz 0.1 - 1.1: Building a Java Fuzzer for the Web &lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Yiannis_Pavlosoglou Yiannis Pavlosoglou]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; |Industry Outlook Panel: ''[http://www.linkedin.com/in/markclancy Mark Clancy] EVP CitiGroup, [http://www.linkedin.com/pub/0/497/86a Jim Routh] CISO DTCC, [http://www.linkedin.com/pub/0/bb1/68a Sunil Seshadri] CISO NYSE-Euronet, [http://www.linkedin.com/pub/0/1ba/4a9 Warren Axelrod] SVP Bank of America, [http://www.linkedin.com/in/bernik Joe Bernik] SVP, RBS,[http://www.linkedin.com/pub/8/878/240 Jennifer Bayuk] Infosec Consultant &amp;amp; [http://www.linkedin.com/in/philvenables Philip Venables] CISO, Goldman Sachs&lt;br /&gt;
[http://www.linkedin.com/in/crecalde Carlos Recalde] SVP, Lehman Brothers&lt;br /&gt;
[http://www.linkedin.com/in/mahidontamsetti Mahi Dontamsetti] Moderator''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Wild_Wild_Web_on_Security_Planet Wild Wild Web on Security Planet]&lt;br /&gt;
''[http://www.securisksolutions.com/company/execmgt.aspx Mano Paul]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; |[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-GunterOllmann Multidisciplinary Bank Attacks]&lt;br /&gt;
''Gunter Ollmann''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Enterprise Security API [http://www.owasp.org/index.php/ESAPI (ESAPI) Project]&lt;br /&gt;
'' [http://www.aspectsecurity.com/management.htm Jeff Williams]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Shootout @ Blackbox Corral&lt;br /&gt;
''Larry Suto ''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Case Studies: Exploiting application testing tool deficiencies via &amp;quot;out of band&amp;quot; injection&lt;br /&gt;
''[http://www.linkedin.com/pub/0/a91/aa2 Vijay Akasapu] &amp;amp; [http://www.linkedin.com/pub/9/279/381 Marshall Heilman]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Threading the Needle:&lt;br /&gt;
&lt;br /&gt;
Bypassing web application/service security controls using Encoding, Transcoding, Filter Evasion, and other Canonicalization Attacks&lt;br /&gt;
'' [http://www.linkedin.com/in/arianevans Arian Evans]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; |Shhhh Don’t Tell Anybody &lt;br /&gt;
''[http://www.linkedin.com/in/ppetkov Petko D. Petkov]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Andres_Riancho w3af - A Framework to own the web]&lt;br /&gt;
''Andres Riancho''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:00-18:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Live_CD_Project OWASP Live CD]&lt;br /&gt;
'' [http://www.linkedin.com/in/packetfocus Joshua Perrymon]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Coding Secure w/PHP&lt;br /&gt;
''[http://www.linkedin.com/in/zaunere Hans Zaunere]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Payment_Card_Data_Security_and_the_new_Enterprise_Java Payment Card Data Security and the new Enterprise Java]&lt;br /&gt;
''[https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Dr._B._V._Kumar Dr. B. V. Kumar] &amp;amp; [https://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-SPEAKER-Abhay_Bhargav Mr. Abhay Bhargav]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 20:00-23:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP NYC AppSec 2008 VIP Party&lt;br /&gt;
''Location: TBD''&lt;br /&gt;
|-&lt;br /&gt;
! colspan=&amp;quot;10&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | Day 2 – Sept 25th, 2008 &lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#99FF99&amp;quot; | 08:00-10:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; |  BREAKFAST - Provided by event sponsors @ TechExpo&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 08:00-08:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | State of the Union&lt;br /&gt;
''[http://www.aeispeakers.com/speakerbio.php?SpeakerID=1192 Prof. Howard A. Schmidt, CISSP, CISM (Hon.)] Current (ISC)² Security Strategist and Former White House Cyber Security Advisor''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/AppSecEU08_Best_Practices_Guide_Web_Application_Firewalls Best Practices Guide: Web Application Firewalls]&lt;br /&gt;
''Alexander Meisel''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | The Good The Bad and The Ugly - Pen Testing VS. Source Code Analysis&lt;br /&gt;
''[http://www.linkedin.com/in/tommyryan Thomas Ryan]'' &amp;amp; ''[http://www.linkedin.com/in/steveantoniewicz Steve Antoniewicz]''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 09:00-09:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.trutv.com/video/tiger-team/tiger-team-101-1-of-4.html APPSEC Red/Tiger Team Projects]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/373/994 Chris Nickerson]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | OWASP &amp;quot;Google Hacking&amp;quot; Project &lt;br /&gt;
''[http://www.linkedin.com/in/ChristianHeinrich Christian Heinrich]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | OWASP Web Services Top Ten&lt;br /&gt;
''[http://1raindrop.typepad.com Gunnar Peterson]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 10:00-10:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Lets talk about OWASP....&lt;br /&gt;
''Dinis Cruz''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | &amp;quot;Help Wanted&amp;quot; [http://www.infosecleaders.com/survey 7 Things You Need to Know APPSEC/INFOSEC Employment]&lt;br /&gt;
''[http://www.linkedin.com/pub/0/29/685 Lee Kushner]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Industry Analyst with Forrester Research&lt;br /&gt;
''[http://www.forrester.com/rb/analyst/chenxi_wang Chenxi Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 11:00-11:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_CLASP_Project CLASP (Comprehensive, Lightweight Application Security Process)]&lt;br /&gt;
''Pravir Chandra''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Next Generation Cross Site Scripting Worms &lt;br /&gt;
''[http://i8jesus.com/?page_id=5 Arshan Dabirsiaghi]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Secure Software Impact&lt;br /&gt;
''[http://ouncelabs.com/company/team.asp Jack Danahy]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-12:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security in Agile Development&lt;br /&gt;
''[http://www.owasp.org/index.php/User:Wichers Dave Wichers]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Security of Software-as-a-Service (SaaS)&lt;br /&gt;
''[http://www.linkedin.com/pub/6/372/45a James Landis]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://reversebenchmarking.com/About.html Open Reverse Benchmarking Project]&lt;br /&gt;
''Marce Luck &amp;amp; [http://www.linkedin.com/pub/1/507/616 Tom Stracener]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 12:00-13:00 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#F2F2F2&amp;quot; align=&amp;quot;center&amp;quot; | [http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference/ctf Capture the Flag] Status&lt;br /&gt;
''LUNCH - Provided @ TechExpo''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 13:00-13:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Security Research Report&lt;br /&gt;
''[http://www.linkedin.com/pub/5/742/233 Dinis Cruz]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Pantera_Web_Assessment_Studio_Project Pantera Advances]&lt;br /&gt;
''[http://www.linkedin.com/pub/1/598/855 Simon Roses Femerling]''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [https://www.owasp.org/index.php/User_talk:Jian Lotus Notes/Domino Web Application Security]&lt;br /&gt;
''[https://www.owasp.org/index.php/User_talk:Jian Jian Hui Wang]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 14:00-14:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Practical Advanced Threat Modeling&lt;br /&gt;
''John Steven''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project Owasp Orizon]&lt;br /&gt;
''Paolo Perego''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Building_Usable_Security Building Usable Security]&lt;br /&gt;
[http://www.owasp.org/index.php/Zed_Abbadi Zed Abbadi]&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 15:00-15:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | [http://www.owasp.org/index.php/Input_validation:_the_Good%2C_the_Bad_and_the_Ugly Input validation: the Good, the Bad and the Ugly]&lt;br /&gt;
''[http://johanpeeters.com Johan Peeters]''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Off-shoring Application Development? Security is Still Your Problem&lt;br /&gt;
''Rohyt Belani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | [[NIST SAMATE Static Analysis Tool Exposition (SATE)]]&lt;br /&gt;
''[http://www.owasp.org/index.php/OWASP_NYC_AppSec_2008_Conference-vadim-okun Vadim Okun]''&lt;br /&gt;
|-&lt;br /&gt;
| style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 16:00-16:45 || style=&amp;quot;width:30%; background:#BC857A&amp;quot; align=&amp;quot;left&amp;quot; | Vulnerabilities in application interpreters and runtimes&lt;br /&gt;
''Erik Cabetas''&lt;br /&gt;
 | style=&amp;quot;width:30%; background:#BCA57A&amp;quot; align=&amp;quot;left&amp;quot; | Flash Parameter Injection (FPI)&lt;br /&gt;
''Ayal Yogev &amp;amp; Adi Sharabani''&lt;br /&gt;
| style=&amp;quot;width:30%; background:#99FF99&amp;quot; align=&amp;quot;left&amp;quot; | Mastering PCI Section 6.6&lt;br /&gt;
''[http://www.linkedin.com/pub/1/228/6a5 Taylor McKinley] and [http://www.linkedin.com/in/jacobwest Jacob West]''&lt;br /&gt;
|-&lt;br /&gt;
 | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 17:00-17:45 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; |  '''Wizdom of Crowds / CTF Awards &amp;amp; Raffles'''&lt;br /&gt;
|-&lt;br /&gt;
  | style=&amp;quot;width:10%; background:#7B8ABD&amp;quot; | 18:30-19:30 || colspan=&amp;quot;3&amp;quot; style=&amp;quot;width:80%; background:#C2C2C2&amp;quot; align=&amp;quot;center&amp;quot; | OWASP Foundation, Chapter Leader Meeting&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 http://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Technology Pavilion - September 24th and 25th  ==&lt;br /&gt;
&lt;br /&gt;
Want to see the latest offerings from technology product and service firms, visit the Technology Pavilion. On September 24th and 25th. 2 full days of exhibits by service providers and manufacturers from around the world.&lt;br /&gt;
&lt;br /&gt;
Do you want to preview the event space [http://www.flickr.com/photos/21550725@N04/sets/72157604662279903/detail Click Here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;hr&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== CPE Credits ==&lt;br /&gt;
&lt;br /&gt;
Much of the content is eligible for CPE credits.  Please check with your institution regarding specific requirements.&lt;br /&gt;
&lt;br /&gt;
'''The CISM cpe policy (www.isaca.org/cismcpepolicy) states''': &lt;br /&gt;
&lt;br /&gt;
One continuing professional education hour is earned for each fifty minutes of active participation (excluding lunches and breaks) in a professional educational activity. Continuing professional education hours are only earned in full-hour increments and rounding must be down. For example, a CISA who attends an eight-hour presentation (480 minutes) with 90 minutes of breaks will earn seven (7) continuing professional education hours.&lt;br /&gt;
&lt;br /&gt;
Activities that qualify for CPE must be directly applicable to the management, design or assessment of an enterprise's information security as per the CISM job practice&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Earn (ISC)2 CPE Credits at 2008 OWASP USA, NYC'''&lt;br /&gt;
&lt;br /&gt;
Attendance at the 2008 OWASP NYC Training Courses or Conferences will earn you Continuing Professional Education (CPE) credits as follows:&lt;br /&gt;
Training Courses: September 22-23, 2008&lt;br /&gt;
•	16 CPE units for 2 days of training (Monday - Tuesday) &lt;br /&gt;
•	8 CPE units for 1 day of training (Monday or Tuesday Only) &lt;br /&gt;
Conferences: September 24-25, 2008&lt;br /&gt;
Earn 1 CPE per hour of conference attendance&lt;br /&gt;
&lt;br /&gt;
== [http://www.owasp.org/index.php/Category:OWASP_AppSec_Conference_Training OWASP NYC AppSec 2008 Training Courses - September 22nd and 23rd, 2008] ==&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T1. Defensive Programming - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This class will teach you how to program defensively. A must for developers, managers, testers and security professionals. Learn the latest techniques to build attack resistant code, protect from current and future vulnerabilities and how to secure an application from both implementation bugs and design flaws. The instructor Pravir Chandra is well known security expert, project lead for OWASP CLASP project and former co-founder &amp;amp; CTO of secure software [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Jason Rouse, Technical Manager, [http://www.cigital.com/training/series http://www.owasp.org/images/b/be/Cigital_OWASP.GIF]''' &lt;br /&gt;
 |-&lt;br /&gt;
{| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T2. Secure Coding for Java EE - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | This course is similar to Aspect's Building and Testing Secure Web Applications except it includes a significant amount of Java focused content, including:&lt;br /&gt;
# Java EE security overview,&lt;br /&gt;
# All coding examples and recommendations are specifically focused on Java and Java servers, and&lt;br /&gt;
# 3 additional hands on coding labs where the students find and then fix security vulnerabilities in a Java EE application developed for the class.&lt;br /&gt;
&lt;br /&gt;
[[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Dave Wichers: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]&lt;br /&gt;
'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T3. Web Services and XML Security - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | The movement towards Web Services and Service Oriented architecture (SOA) paradigms requires new security paradigms to deal with new risks posed by these architectures. This session takes a pragmatic approach towards identifying Web Services security risks and selecting and applying countermeasures to the application, code, web servers, databases, application, and identity servers and related software. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Gunnar Peterson''' [http://www.arctecgroup.net https://www.owasp.org/images/b/bf/Arctec.jpg]&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T4. Advanced Web Application Security Testing - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Course Overview While all developers need to know the basics of web application security testing, application security specialists will want to know all the advanced techniques for finding and diagnosing security problems in applications. Aspect’s Advanced Web Application Security Testing training is based on a decade of work verifying the security of critical applications. The course is taught by an experienced application security practitioner in an interactive manner. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
Instructor: Eric Sheridan: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
 |-&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T5. Leading the Development of Secure Applications 1-Day - Sept 22nd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  In this one-day management session you’ll get the answers to the ten key questions that most CIOs and development managers face when trying to improve security in the development process.  The course provides proven techniques and valuable lessons learned that can be applied to projects at any phase of their application’s lifecycle. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: John Pavone: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T6. Building Secure Rich Internet Applications 1-Day - Sept 23rd- $675&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; |  Rich Internet applications using technologies like Ajax, Flash, ActiveX, and Java Applets require special attention to secure. This one day training addresses the special issues that arise in this type of application development.  [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
Instructor: Arshan Dabirsiaghi: [http://www.aspectsecurity.com http://www.owasp.org/images/d/d1/Aspect_logo.gif]'''&lt;br /&gt;
|-&lt;br /&gt;
 {| style=&amp;quot;width:80%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot; | T8. Writing Secure Code  ASP.NET - 2-Days - $1350&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;background:#F2F2F2&amp;quot; | Understand the key security features of the .NET platform, the common web security pitfalls developers make, and how to build secure and reliable web applications using ASP.NET. Students are lead through hands on code examples that highlight issues and prescribe solutions. [[:Category:OWASP_AppSec_Conference_Training | Learn More Here]]&lt;br /&gt;
&lt;br /&gt;
The instructors are Foundstone's Technical Director, Rudolph Araujo and Foundstone's Professional Services Conlultant, Alex Smolen. [http://www.foundstone.com/us/education-overview.asp https://www.owasp.org/images/2/26/Foundstone.jpg]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;center&amp;gt;[http://guest.cvent.com/i.aspx?4W,M3,828ca6d1-1b60-4105-8034-d344700e6956 https://www.owasp.org/images/7/7f/Register.gif]&amp;lt;/center&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt; HOTELS / TRAVEL &amp;lt;/h2&amp;gt;&lt;br /&gt;
[http://maps.google.com/maps?near=Pace+Plz,+New+York,+NY+10038+(Pace+University+New+York+Cmps)&amp;amp;geocode=15467452012610799558,40.711640,-74.005820&amp;amp;q=hotel&amp;amp;f=l&amp;amp;dq=Pace+University-New+York&amp;amp;ie=UTF8&amp;amp;z=15&amp;amp;om=0 Hotels in the area of the event]&lt;br /&gt;
&lt;br /&gt;
New York City MTA: http://www.mta.nyc.ny.us/nyct/index.html&lt;br /&gt;
&lt;br /&gt;
New York City Subway &amp;amp; walking directions: http://www.hopstop.com/?city=newyork&lt;br /&gt;
&lt;br /&gt;
New York Sights &amp;amp; Sounds - SightsSounds&lt;br /&gt;
&lt;br /&gt;
New York City Travel Guide - http://www.nytoday.com/&lt;br /&gt;
&lt;br /&gt;
New York City Attractions - http://www.nycvisit.com&lt;br /&gt;
&lt;br /&gt;
New York TV Show Tickets - Get free tickets to TV shows! - http://www.nytix.com/&lt;br /&gt;
&lt;br /&gt;
New York City local news: http://www.ny1news.com&lt;br /&gt;
&lt;br /&gt;
&amp;lt;h2&amp;gt;EVENT SPONSORSHIP &amp;lt;/h2&amp;gt;The OWASP Conferences &amp;amp; Training security technologists including CSOs,admins, application admins, MIS directors, homeland defense chiefs. These important influencers drive buying decisions exclusive access to its audiences. OWASP has established strategic relationships with security—print publications, newsletters, portals, consultants,message—and leadership positioning OWASP events. OWASP’s mission is supported by organizations who share our application, and software security communities. This approach should be part of your mix.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;[https://www.owasp.org/images/6/66/NY_Sponsorship_Form_update_%282%29.pdf Sponsorship Opportunities]- Register online: [http://guest.cvent.com/i.aspx?4W,M3,09e3b490-ba93-4474-851e-be803b1a01c2 click here]&amp;lt;/b&amp;gt;&lt;/div&gt;</summary>
		<author><name>Ivanr</name></author>	</entry>

	</feed>