<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jekist</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Jekist"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Jekist"/>
		<updated>2026-04-19T22:13:05Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113968</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113968"/>
				<updated>2011-07-15T18:53:39Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Call For Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Buffalo|extra=The chapter leader is [mailto:james.kist@gmail.com James Kist]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-buffalo|emailarchives=http://lists.owasp.org/pipermail/owasp-buffalo}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Buffalo&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
== Call For Presentations  ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo Chapter of the Open Web Application Security Project (OWASP) is pleased to announce this &lt;br /&gt;
&lt;br /&gt;
=== CALL FOR PRESENTATIONS ===&lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP Chapter is currently looking for individuals from research, academia and industry to give presentations on various topics related to application security. For more information, please see the CFP at https://www.owasp.org/images/5/59/Buffalo_OWASP_CFP_July_2011.pdf&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is currently being planned. Stay tuned for details!&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP chapter is currently looking for a new home. If you have a facility that can house our meetings (about 20 people), please contact us and let us know. Thanks!&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
[http://wnyruby.com/ WNY Ruby Users Group]&lt;br /&gt;
&lt;br /&gt;
==== Buffalo OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Buffalo_OWASP_CFP_July_2011.pdf&amp;diff=113967</id>
		<title>File:Buffalo OWASP CFP July 2011.pdf</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Buffalo_OWASP_CFP_July_2011.pdf&amp;diff=113967"/>
				<updated>2011-07-15T18:50:53Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: Buffalo OWASP Call For Presentations July 2011&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Buffalo OWASP Call For Presentations July 2011&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113966</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113966"/>
				<updated>2011-07-15T18:47:23Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Call For Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Buffalo|extra=The chapter leader is [mailto:james.kist@gmail.com James Kist]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-buffalo|emailarchives=http://lists.owasp.org/pipermail/owasp-buffalo}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Buffalo&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
== Call For Presentations  ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo Chapter of the Open Web Application Security Project (OWASP) is pleased to announce this &lt;br /&gt;
&lt;br /&gt;
=== CALL FOR PRESENTATIONS ===&lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP Chapter is currently looking for individuals from research, academia and industry to give presentations on various topics related to application security. For more information, please see the CFP [here].&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is currently being planned. Stay tuned for details!&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP chapter is currently looking for a new home. If you have a facility that can house our meetings (about 20 people), please contact us and let us know. Thanks!&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
[http://wnyruby.com/ WNY Ruby Users Group]&lt;br /&gt;
&lt;br /&gt;
==== Buffalo OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113965</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113965"/>
				<updated>2011-07-15T18:38:49Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Call For Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Buffalo|extra=The chapter leader is [mailto:james.kist@gmail.com James Kist]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-buffalo|emailarchives=http://lists.owasp.org/pipermail/owasp-buffalo}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Buffalo&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Call For Presentations ==&lt;br /&gt;
The Buffalo Chapter of the Open Web Application Security Project (OWASP) is pleased to announce this &lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;CALL FOR PRESENTATIONS&amp;lt;/H3&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP Chapter is currently looking for individuals from&lt;br /&gt;
research, academia and industry to give presentations on various&lt;br /&gt;
topics related to application security. For more information, please see the CFP here.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is currently being planned. Stay tuned for details!&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP chapter is currently looking for a new home. If you have a facility that can house our meetings (about 20 people), please contact us and let us know. Thanks!&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
[http://wnyruby.com/ WNY Ruby Users Group]&lt;br /&gt;
&lt;br /&gt;
==== Buffalo OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113964</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113964"/>
				<updated>2011-07-15T18:36:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Call For Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Buffalo|extra=The chapter leader is [mailto:james.kist@gmail.com James Kist]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-buffalo|emailarchives=http://lists.owasp.org/pipermail/owasp-buffalo}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Buffalo&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Call For Presentations ==&lt;br /&gt;
The Buffalo Chapter of the Open Web Application Security Project (OWASP) is pleased to announce this &lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;CALL FOR PRESENTATIONS&amp;lt;/H3&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP Chapter is currently looking for individuals from&lt;br /&gt;
research, academia and industry to give presentations on various&lt;br /&gt;
topics related to application security. OWASP is an open community&lt;br /&gt;
dedicated to enabling organizations to conceive, develop, acquire,&lt;br /&gt;
operate, and maintain applications that can be trusted. All of the&lt;br /&gt;
OWASP tools, documents, forums, and chapters are free and open to&lt;br /&gt;
anyone interested in improving application security. We advocate&lt;br /&gt;
approaching application security as a people, process, and technology&lt;br /&gt;
problem because the most effective approaches to application security&lt;br /&gt;
include improvements in all of these areas. We can be found at&lt;br /&gt;
www.owasp.org.&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;H5&amp;gt;Proposed topics&amp;lt;/H5&amp;gt;&lt;br /&gt;
Examples of types of talks we are looking for include but are not limited to:&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Web Application Security&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Mobile Application Security&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Software Forensics including but not limited to: Application,&lt;br /&gt;
Physical memory forensics, solid state disk forensics, network&lt;br /&gt;
forensics&lt;br /&gt;
&amp;lt;BR&amp;gt;4. Software topics related to Cyber Crime&lt;br /&gt;
&amp;lt;BR&amp;gt;5. Cloud Security / Assessing Cloud Security and its software&lt;br /&gt;
(including virtualization)&lt;br /&gt;
&amp;lt;BR&amp;gt;6. Reversing Engineering Malware&lt;br /&gt;
&amp;lt;BR&amp;gt;7. Software Root Kits&lt;br /&gt;
&amp;lt;BR&amp;gt;8. Legal and privacy issues related to software&lt;br /&gt;
&amp;lt;BR&amp;gt;9. Any other topic related with application security&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;H5&amp;gt;Rules for presentations:&amp;lt;/H5&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Presentations should be limited to 45 minutes, including Q &amp;amp; A.&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Presentations must be vendor-neutral - absolutely no advertising&lt;br /&gt;
will be allowed&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Vendors will be allowed to present, but must refrain from&lt;br /&gt;
delivering a sales pitch&lt;br /&gt;
&amp;lt;BR&amp;gt;4. The presentations must include facts and objective opinions, but&lt;br /&gt;
must not be an attempt to persuade the audience to purchase specific&lt;br /&gt;
products or services&lt;br /&gt;
&amp;lt;BR&amp;gt;5. Presentations should include demos and other interactive content to&lt;br /&gt;
keep the audience engaged&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H5&amp;gt;Proposals should consist of the following information:&amp;lt;/H5&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Presenter name, email address, phone, city &amp;amp; state.&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Employer and/or affiliations.&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Brief biography, including any significant presentation and educational experience/background.&lt;br /&gt;
&amp;lt;BR&amp;gt;4. Topic synopsis, proposed presentation title, and a one paragraph description&lt;br /&gt;
&amp;lt;BR&amp;gt;5. A description of the materials that will be made available to the&lt;br /&gt;
audience (Powerpoint slides, PDF's, etc.)&lt;br /&gt;
&amp;lt;BR&amp;gt;6. Optionally, any samples of prepared material or outlines ready.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;P&amp;gt;&amp;lt;B&amp;gt;Please send all responses to buffalo.owasp@gmail.com&amp;lt;/B&amp;gt;&amp;lt;/P&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is currently being planned. Stay tuned for details!&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP chapter is currently looking for a new home. If you have a facility that can house our meetings (about 20 people), please contact us and let us know. Thanks!&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
[http://wnyruby.com/ WNY Ruby Users Group]&lt;br /&gt;
&lt;br /&gt;
==== Buffalo OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113963</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113963"/>
				<updated>2011-07-15T18:36:19Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Call For Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Buffalo|extra=The chapter leader is [mailto:james.kist@gmail.com James Kist]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-buffalo|emailarchives=http://lists.owasp.org/pipermail/owasp-buffalo}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Buffalo&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Call For Presentations ==&lt;br /&gt;
The Buffalo Chapter of the Open Web Application Security Project (OWASP) is pleased to announce this &lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;CALL FOR PRESENTATIONS&amp;lt;/H3&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP Chapter is currently looking for individuals from&lt;br /&gt;
research, academia and industry to give presentations on various&lt;br /&gt;
topics related to application security. OWASP is an open community&lt;br /&gt;
dedicated to enabling organizations to conceive, develop, acquire,&lt;br /&gt;
operate, and maintain applications that can be trusted. All of the&lt;br /&gt;
OWASP tools, documents, forums, and chapters are free and open to&lt;br /&gt;
anyone interested in improving application security. We advocate&lt;br /&gt;
approaching application security as a people, process, and technology&lt;br /&gt;
problem because the most effective approaches to application security&lt;br /&gt;
include improvements in all of these areas. We can be found at&lt;br /&gt;
www.owasp.org.&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;H5&amp;gt;Proposed topics&amp;lt;/H5&amp;gt;&lt;br /&gt;
Examples of types of talks we are looking for include but are not limited to:&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Web Application Security&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Mobile Application Security&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Software Forensics including but not limited to: Application,&lt;br /&gt;
Physical memory forensics, solid state disk forensics, network&lt;br /&gt;
forensics&lt;br /&gt;
&amp;lt;BR&amp;gt;4. Software topics related to Cyber Crime&lt;br /&gt;
&amp;lt;BR&amp;gt;5. Cloud Security / Assessing Cloud Security and its software&lt;br /&gt;
(including virtualization)&lt;br /&gt;
&amp;lt;BR&amp;gt;6. Reversing Engineering Malware&lt;br /&gt;
&amp;lt;BR&amp;gt;7. Software Root Kits&lt;br /&gt;
&amp;lt;BR&amp;gt;8. Legal and privacy issues related to software&lt;br /&gt;
&amp;lt;BR&amp;gt;9. Any other topic related with application security&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;H4&amp;gt;Rules for presentations:&amp;lt;/H4&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Presentations should be limited to 45 minutes, including Q &amp;amp; A.&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Presentations must be vendor-neutral - absolutely no advertising&lt;br /&gt;
will be allowed&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Vendors will be allowed to present, but must refrain from&lt;br /&gt;
delivering a sales pitch&lt;br /&gt;
&amp;lt;BR&amp;gt;4. The presentations must include facts and objective opinions, but&lt;br /&gt;
must not be an attempt to persuade the audience to purchase specific&lt;br /&gt;
products or services&lt;br /&gt;
&amp;lt;BR&amp;gt;5. Presentations should include demos and other interactive content to&lt;br /&gt;
keep the audience engaged&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;Proposals should consist of the following information:&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Presenter name, email address, phone, city &amp;amp; state.&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Employer and/or affiliations.&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Brief biography, including any significant presentation and educational experience/background.&lt;br /&gt;
&amp;lt;BR&amp;gt;4. Topic synopsis, proposed presentation title, and a one paragraph description&lt;br /&gt;
&amp;lt;BR&amp;gt;5. A description of the materials that will be made available to the&lt;br /&gt;
audience (Powerpoint slides, PDF's, etc.)&lt;br /&gt;
&amp;lt;BR&amp;gt;6. Optionally, any samples of prepared material or outlines ready.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;P&amp;gt;&amp;lt;B&amp;gt;Please send all responses to buffalo.owasp@gmail.com&amp;lt;/B&amp;gt;&amp;lt;/P&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is currently being planned. Stay tuned for details!&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP chapter is currently looking for a new home. If you have a facility that can house our meetings (about 20 people), please contact us and let us know. Thanks!&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
[http://wnyruby.com/ WNY Ruby Users Group]&lt;br /&gt;
&lt;br /&gt;
==== Buffalo OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113962</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113962"/>
				<updated>2011-07-15T18:35:21Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Call For Presentations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Buffalo|extra=The chapter leader is [mailto:james.kist@gmail.com James Kist]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-buffalo|emailarchives=http://lists.owasp.org/pipermail/owasp-buffalo}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Buffalo&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Call For Presentations ==&lt;br /&gt;
The Buffalo Chapter of the Open Web Application Security Project (OWASP) is pleased to announce this &lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;CALL FOR PRESENTATIONS&amp;lt;/H3&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP Chapter is currently looking for individuals from&lt;br /&gt;
research, academia and industry to give presentations on various&lt;br /&gt;
topics related to application security. OWASP is an open community&lt;br /&gt;
dedicated to enabling organizations to conceive, develop, acquire,&lt;br /&gt;
operate, and maintain applications that can be trusted. All of the&lt;br /&gt;
OWASP tools, documents, forums, and chapters are free and open to&lt;br /&gt;
anyone interested in improving application security. We advocate&lt;br /&gt;
approaching application security as a people, process, and technology&lt;br /&gt;
problem because the most effective approaches to application security&lt;br /&gt;
include improvements in all of these areas. We can be found at&lt;br /&gt;
www.owasp.org.&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;H4&amp;gt;Proposed topics&amp;lt;/H4&amp;gt;&lt;br /&gt;
Examples of types of talks we are looking for include but are not limited to:&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Web Application Security&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Mobile Application Security&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Software Forensics including but not limited to: Application,&lt;br /&gt;
Physical memory forensics, solid state disk forensics, network&lt;br /&gt;
forensics&lt;br /&gt;
&amp;lt;BR&amp;gt;4. Software topics related to Cyber Crime&lt;br /&gt;
&amp;lt;BR&amp;gt;5. Cloud Security / Assessing Cloud Security and its software&lt;br /&gt;
(including virtualization)&lt;br /&gt;
&amp;lt;BR&amp;gt;6. Reversing Engineering Malware&lt;br /&gt;
&amp;lt;BR&amp;gt;7. Software Root Kits&lt;br /&gt;
&amp;lt;BR&amp;gt;8. Legal and privacy issues related to software&lt;br /&gt;
&amp;lt;BR&amp;gt;9. Any other topic related with application security&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;H4&amp;gt;Rules for presentations:&amp;lt;/H4&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Presentations should be limited to 45 minutes, including Q &amp;amp; A.&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Presentations must be vendor-neutral - absolutely no advertising&lt;br /&gt;
will be allowed&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Vendors will be allowed to present, but must refrain from&lt;br /&gt;
delivering a sales pitch&lt;br /&gt;
&amp;lt;BR&amp;gt;4. The presentations must include facts and objective opinions, but&lt;br /&gt;
must not be an attempt to persuade the audience to purchase specific&lt;br /&gt;
products or services&lt;br /&gt;
&amp;lt;BR&amp;gt;5. Presentations should include demos and other interactive content to&lt;br /&gt;
keep the audience engaged&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;Proposals should consist of the following information:&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Presenter name, email address, phone, city &amp;amp; state.&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Employer and/or affiliations.&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Brief biography, including any significant presentation and educational experience/background.&lt;br /&gt;
&amp;lt;BR&amp;gt;4. Topic synopsis, proposed presentation title, and a one paragraph description&lt;br /&gt;
&amp;lt;BR&amp;gt;5. A description of the materials that will be made available to the&lt;br /&gt;
audience (Powerpoint slides, PDF's, etc.)&lt;br /&gt;
&amp;lt;BR&amp;gt;6. Optionally, any samples of prepared material or outlines ready.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;P&amp;gt;&amp;lt;B&amp;gt;Please send all responses to buffalo.owasp@gmail.com&amp;lt;/B&amp;gt;&amp;lt;/P&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is currently being planned. Stay tuned for details!&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP chapter is currently looking for a new home. If you have a facility that can house our meetings (about 20 people), please contact us and let us know. Thanks!&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
[http://wnyruby.com/ WNY Ruby Users Group]&lt;br /&gt;
&lt;br /&gt;
==== Buffalo OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113961</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=113961"/>
				<updated>2011-07-15T18:32:25Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Goals &amp;amp; Objectives */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Buffalo|extra=The chapter leader is [mailto:james.kist@gmail.com James Kist]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-buffalo|emailarchives=http://lists.owasp.org/pipermail/owasp-buffalo}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Buffalo&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Call For Presentations ==&lt;br /&gt;
The Buffalo Chapter of the Open Web Application Security Project (OWASP) is pleased to announce this &lt;br /&gt;
&lt;br /&gt;
&amp;lt;H3&amp;gt;CALL FOR PRESENTATIONS&amp;lt;/H3&amp;gt; &lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP Chapter is currently looking for individuals from&lt;br /&gt;
research, academia and industry to give presentations on various&lt;br /&gt;
topics related to application security. OWASP is an open community&lt;br /&gt;
dedicated to enabling organizations to conceive, develop, acquire,&lt;br /&gt;
operate, and maintain applications that can be trusted. All of the&lt;br /&gt;
OWASP tools, documents, forums, and chapters are free and open to&lt;br /&gt;
anyone interested in improving application security. We advocate&lt;br /&gt;
approaching application security as a people, process, and technology&lt;br /&gt;
problem because the most effective approaches to application security&lt;br /&gt;
include improvements in all of these areas. We can be found at&lt;br /&gt;
www.owasp.org.&lt;br /&gt;
&amp;lt;BR&amp;gt;&amp;lt;H4&amp;gt;Proposed topics&amp;lt;/H4&amp;gt;&lt;br /&gt;
Examples of types of talks we are looking for include but are not limited to:&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Web Application Security&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Mobile Application Security&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Software Forensics including but not limited to: Application,&lt;br /&gt;
Physical memory forensics, solid state disk forensics, network&lt;br /&gt;
forensics&lt;br /&gt;
&amp;lt;BR&amp;gt;4. Software topics related to Cyber Crime&lt;br /&gt;
&amp;lt;BR&amp;gt;5. Cloud Security / Assessing Cloud Security and its software&lt;br /&gt;
(including virtualization)&lt;br /&gt;
&amp;lt;BR&amp;gt;6. Reversing Engineering Malware&lt;br /&gt;
&amp;lt;BR&amp;gt;7. Software Root Kits&lt;br /&gt;
&amp;lt;BR&amp;gt;8. Legal and privacy issues related to software&lt;br /&gt;
&amp;lt;BR&amp;gt;9. Any other topic related with application security&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;H4&amp;gt;Rules for presentations:&amp;lt;/H4&amp;gt;&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Presentations should be limited to 45 minutes, including Q &amp;amp; A.&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Presentations must be vendor-neutral - absolutely no advertising&lt;br /&gt;
will be allowed&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Vendors will be allowed to present, but must refrain from&lt;br /&gt;
delivering a sales pitch&lt;br /&gt;
&amp;lt;BR&amp;gt;4. The presentations must include facts and objective opinions, but&lt;br /&gt;
must not be an attempt to persuade the audience to purchase specific&lt;br /&gt;
products or services&lt;br /&gt;
&amp;lt;BR&amp;gt;5. Presentations should include demos and other interactive content to&lt;br /&gt;
keep the audience engaged&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;H4&amp;gt;Proposals should consist of the following information:&amp;lt;/H4&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;1. Presenter name, email address, phone, city &amp;amp; state.&lt;br /&gt;
&amp;lt;BR&amp;gt;2. Employer and/or affiliations.&lt;br /&gt;
&amp;lt;BR&amp;gt;3. Brief biography, including any significant presentation and educational experience/background.&lt;br /&gt;
&amp;lt;BR&amp;gt;4. Topic synopsis, proposed presentation title, and a one paragraph description&lt;br /&gt;
&amp;lt;BR&amp;gt;5. A description of the materials that will be made available to the&lt;br /&gt;
audience (Powerpoint slides, PDF's, etc.)&lt;br /&gt;
&amp;lt;BR&amp;gt;6. Optionally, any samples of prepared material or outlines ready.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&amp;lt;P&amp;gt;&amp;lt;B&amp;gt;Please send all responses to buffalo.owasp@gmail.com&amp;lt;/B&amp;gt;&amp;lt;/P&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is currently being planned. Stay tuned for details!&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP chapter is currently looking for a new home. If you have a facility that can house our meetings (about 20 people), please contact us and let us know. Thanks!&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
[http://wnyruby.com/ WNY Ruby Users Group]&lt;br /&gt;
&lt;br /&gt;
==== Buffalo OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=111060</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=111060"/>
				<updated>2011-05-25T09:49:11Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Buffalo|extra=The chapter leader is [mailto:james.kist@gmail.com James Kist]|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-buffalo|emailarchives=http://lists.owasp.org/pipermail/owasp-buffalo}}&lt;br /&gt;
&lt;br /&gt;
==== Local News ====&lt;br /&gt;
&amp;lt;paypal&amp;gt;Buffalo&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
==== Chapter Meetings ====&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is currently being planned. Stay tuned for details!&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo OWASP chapter is currently looking for a new home. If you have a facility that can house our meetings (about 20 people), please contact us and let us know. Thanks!&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
[http://wnyruby.com/ WNY Ruby Users Group]&lt;br /&gt;
&lt;br /&gt;
==== Buffalo OWASP Chapter Leaders ====&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
__NOTOC__&lt;br /&gt;
&amp;lt;headertabs/&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=51116</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=51116"/>
				<updated>2009-01-13T21:41:06Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Buffalo&amp;lt;/paypal&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&amp;lt;BR&amp;gt;&lt;br /&gt;
'''KnowledgeAir, LLC'''&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is currently being planned. Stay tuned for details!&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:New York]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=29695</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=29695"/>
				<updated>2008-05-22T12:40:38Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&amp;lt;BR&amp;gt;&lt;br /&gt;
'''KnowledgeAir, LLC'''&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is going to be held at KnowledgeAir, LLC on Fri. June 5th from 12:00 to 1:30 pm. Details:&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' PCI DSS for Web Applications&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Date:''' June 5th&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Time:''' 12:00 to 1:30 pm&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Location:'''&amp;lt;BR&amp;gt;&lt;br /&gt;
KnowledgeAir, LLC&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St.&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Driving directions:&lt;br /&gt;
http://knowledgeair.com/knowledgeair-locations.html&lt;br /&gt;
&lt;br /&gt;
'''Registration:'''&amp;lt;p&amp;gt;&lt;br /&gt;
http://www.eventbrite.com/event/118040061&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Presentation Overview:'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
This presentation addresses the requirements outlined in the PCI Data Security Standard (PCI DSS) version 1.1 that are relevant to web application development and security, and will provide guidance on how to meet these requirements. The PCI DSS version 1.1, a set of comprehensive requirements for enhancing payment account data security, was developed by the founding payment brands of the PCI Security Standards Council, including American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc., to help facilitate the broad adoption of consistent data security measures on a global basis. All organizations that process, store or transmit credit card data are required to comply with the PCI DSS 1.1 requirements. &amp;lt;/P&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the speaker:'''&lt;br /&gt;
&amp;lt;p&amp;gt;R. Christian Call, a recognized Dartmouth College graduate, worked for many years as a software developer in the areas of Operating Systems (IBM), object code-level program translation (AT&amp;amp;T Bell Laboratories), network firewalls (Lucent Technologies Bell Labs Innovations), network security (Lumeta), and Public Key Infrastructure (US Army/Maden Tech Consulting).  As a Sales Engineer, Chris worked with application security companies Secure Software, Inc. and Ounce Labs before joining Breach Security.  Chris is the East Coast Sales Engineer for Breach, and has worked with some of Breach’s largest customers on proof-of-concept, demonstration of value, deployment, and support.&lt;br /&gt;
&amp;lt;/P&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=29694</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=29694"/>
				<updated>2008-05-22T12:39:13Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&amp;lt;BR&amp;gt;&lt;br /&gt;
'''KnowledgeAir, LLC'''&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is going to be held at KnowledgeAir, LLC on Fri. June 5th from 12:00 to 1:30 pm. Details:&lt;br /&gt;
&lt;br /&gt;
'''Topic:''' PCI DSS for Web Applications&lt;br /&gt;
'''Date:''' June 5th&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Time:''' 12:00 to 1:30 pm&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Location:'''&amp;lt;BR&amp;gt;&lt;br /&gt;
KnowledgeAir, LLC&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St.&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
Driving directions:&lt;br /&gt;
http://knowledgeair.com/knowledgeair-locations.html&lt;br /&gt;
&lt;br /&gt;
'''Registration:'''&amp;lt;p&amp;gt;&lt;br /&gt;
http://www.eventbrite.com/event/118040061&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Presentation Overview:'''&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
This presentation addresses the requirements outlined in the PCI Data Security Standard (PCI DSS) version 1.1 that are relevant to web application development and security, and will provide guidance on how to meet these requirements. The PCI DSS version 1.1, a set of comprehensive requirements for enhancing payment account data security, was developed by the founding payment brands of the PCI Security Standards Council, including American Express, Discover Financial Services, JCB International, MasterCard Worldwide and Visa Inc., to help facilitate the broad adoption of consistent data security measures on a global basis. All organizations that process, store or transmit credit card data are required to comply with the PCI DSS 1.1 requirements. &amp;lt;/P&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''About the speaker:'''&lt;br /&gt;
&amp;lt;p&amp;gt;R. Christian Call, a recognized Dartmouth College graduate, worked for many years as a software developer in the areas of Operating Systems (IBM), object code-level program translation (AT&amp;amp;T Bell Laboratories), network firewalls (Lucent Technologies Bell Labs Innovations), network security (Lumeta), and Public Key Infrastructure (US Army/Maden Tech Consulting).  As a Sales Engineer, Chris worked with application security companies Secure Software, Inc. and Ounce Labs before joining Breach Security.  Chris is the East Coast Sales Engineer for Breach, and has worked with some of Breach’s largest customers on proof-of-concept, demonstration of value, deployment, and support.&lt;br /&gt;
&amp;lt;/P&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=26340</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=26340"/>
				<updated>2008-03-06T15:49:57Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Other Local IT Organizations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&amp;lt;BR&amp;gt;&lt;br /&gt;
'''KnowledgeAir, LLC'''&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is going to be held at KnowledgeAir, LLC on Fri. Dec 7th from 11:30am to 1:00pm. Details:&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Dec. 7th&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Time:''' 11:30am to 1 pm&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Location:'''&amp;lt;BR&amp;gt;&lt;br /&gt;
KnowledgeAir, LLC&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St.&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;What is OWASP?&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Web application security resources available at OWASP website&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP testing guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Top 10 web application security problems (updated in 2007)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Introduction to web application security tools&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Links to websites dealing with web application security&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Ideas for future meetings (group discussion)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Please note that each of the topics will be covered on an overview&lt;br /&gt;
level (due to time constraints). For future meetings, we can cover any&lt;br /&gt;
of those topics in detail. The floor will also be open to suggestions&lt;br /&gt;
for future meetings.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=26339</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=26339"/>
				<updated>2008-03-06T15:49:33Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Other Local IT Organizations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&amp;lt;BR&amp;gt;&lt;br /&gt;
'''KnowledgeAir, LLC'''&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is going to be held at KnowledgeAir, LLC on Fri. Dec 7th from 11:30am to 1:00pm. Details:&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Dec. 7th&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Time:''' 11:30am to 1 pm&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Location:'''&amp;lt;BR&amp;gt;&lt;br /&gt;
KnowledgeAir, LLC&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St.&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;What is OWASP?&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Web application security resources available at OWASP website&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP testing guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Top 10 web application security problems (updated in 2007)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Introduction to web application security tools&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Links to websites dealing with web application security&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Ideas for future meetings (group discussion)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Please note that each of the topics will be covered on an overview&lt;br /&gt;
level (due to time constraints). For future meetings, we can cover any&lt;br /&gt;
of those topics in detail. The floor will also be open to suggestions&lt;br /&gt;
for future meetings.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://http://www.wnydnug.org/ WNY .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23743</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23743"/>
				<updated>2007-11-29T23:26:37Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&amp;lt;BR&amp;gt;&lt;br /&gt;
'''KnowledgeAir, LLC'''&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is going to be held at KnowledgeAir, LLC on Fri. Dec 7th from 11:30am to 1:00pm. Details:&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Dec. 7th&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Time:''' 11:30am to 1 pm&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Location:'''&amp;lt;BR&amp;gt;&lt;br /&gt;
KnowledgeAir, LLC&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St.&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;What is OWASP?&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Web application security resources available at OWASP website&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP testing guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Top 10 web application security problems (updated in 2007)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Introduction to web application security tools&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Links to websites dealing with web application security&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Ideas for future meetings (group discussion)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Please note that each of the topics will be covered on an overview&lt;br /&gt;
level (due to time constraints). For future meetings, we can cover any&lt;br /&gt;
of those topics in detail. The floor will also be open to suggestions&lt;br /&gt;
for future meetings.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23742</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23742"/>
				<updated>2007-11-29T23:25:48Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&amp;lt;BR&amp;gt;&lt;br /&gt;
'''KnowledgeAir, LLC'''&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is going to be held at KnowledgeAir, LLC on Fri. Nov 16th from 8 to 10am. Details:&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Dec. 7th&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Time:''' 11:30am to 1 pm&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Location:'''&amp;lt;BR&amp;gt;&lt;br /&gt;
KnowledgeAir, LLC&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St.&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;What is OWASP?&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Web application security resources available at OWASP website&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP testing guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Top 10 web application security problems (updated in 2007)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Introduction to web application security tools&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Links to websites dealing with web application security&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Ideas for future meetings (group discussion)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Please note that each of the topics will be covered on an overview&lt;br /&gt;
level (due to time constraints). For future meetings, we can cover any&lt;br /&gt;
of those topics in detail. The floor will also be open to suggestions&lt;br /&gt;
for future meetings.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23112</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23112"/>
				<updated>2007-11-05T18:45:34Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&amp;lt;BR&amp;gt;&lt;br /&gt;
'''KnowledgeAir, LLC'''&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is going to be held at KnowledgeAir, LLC on Fri. Nov 16th from 8 to 10am. Details:&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Nov. 16th&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Time:''' 8 to 10am&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Location:'''&amp;lt;BR&amp;gt;&lt;br /&gt;
KnowledgeAir, LLC&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St.&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;What is OWASP?&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Web application security resources available at OWASP website&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP testing guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Top 10 web application security problems (updated in 2007)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Introduction to web application security tools&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Links to websites dealing with web application security&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Ideas for future meetings (group discussion)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Please note that each of the topics will be covered on an overview&lt;br /&gt;
level (due to time constraints). For future meetings, we can cover any&lt;br /&gt;
of those topics in detail. The floor will also be open to suggestions&lt;br /&gt;
for future meetings.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23110</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23110"/>
				<updated>2007-11-05T18:44:47Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&lt;br /&gt;
KnowledgeAir, LLC&lt;br /&gt;
726 Exchange St&lt;br /&gt;
Suite 628 (6th floor)&lt;br /&gt;
Buffalo, NY 14210&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is going to be held at KnowledgeAir, LLC on Fri. Nov 16th from 8 to 10am. Details:&lt;br /&gt;
&lt;br /&gt;
'''Date:''' Nov. 16th&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Time:''' 8 to 10am&amp;lt;BR&amp;gt;&lt;br /&gt;
'''Location:'''&amp;lt;BR&amp;gt;&lt;br /&gt;
KnowledgeAir, LLC&amp;lt;BR&amp;gt;&lt;br /&gt;
726 Exchange St.&amp;lt;BR&amp;gt;&lt;br /&gt;
Suite 628 (6th floor)&amp;lt;BR&amp;gt;&lt;br /&gt;
Buffalo, NY 14210&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''Agenda:'''&lt;br /&gt;
&amp;lt;UL&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;What is OWASP?&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Web application security resources available at OWASP website&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Quick overview of OWASP testing guide&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;OWASP Top 10 web application security problems (updated in 2007)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Introduction to web application security tools&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Links to websites dealing with web application security&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;LI&amp;gt;Ideas for future meetings (group discussion)&amp;lt;/LI&amp;gt;&lt;br /&gt;
&amp;lt;/UL&amp;gt;&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
Please note that each of the topics will be covered on an overview&lt;br /&gt;
level (due to time constraints). For future meetings, we can cover any&lt;br /&gt;
of those topics in detail. The floor will also be open to suggestions&lt;br /&gt;
for future meetings.&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23108</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23108"/>
				<updated>2007-11-05T18:31:12Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&lt;br /&gt;
KnowledgeAir, LLC&lt;br /&gt;
726 Exchange St&lt;br /&gt;
Suite 628 (6th floor)&lt;br /&gt;
Buffalo, NY 14210&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is going to be held at KnowledgeAir, LLC on Fri. Nov 16th from 8 to 10am. Details:&lt;br /&gt;
&lt;br /&gt;
Date: Nov. 16th&lt;br /&gt;
Time: 8 to 10am&lt;br /&gt;
Location:&lt;br /&gt;
KnowledgeAir, LLC&lt;br /&gt;
726 Exchange St&lt;br /&gt;
Suite 628 (6th floor)&lt;br /&gt;
Buffalo, NY 14210&lt;br /&gt;
&lt;br /&gt;
Agenda:&lt;br /&gt;
What is OWASP?&lt;br /&gt;
Web application security resources available at OWASP website&lt;br /&gt;
Quick overview of OWASP guide&lt;br /&gt;
Quick overview of OWASP testing guide&lt;br /&gt;
OWASP Top 10 web application security problems (updated in 2007)&lt;br /&gt;
Introduction to web application security tools&lt;br /&gt;
Links to websites dealing with web application security&lt;br /&gt;
Ideas for future meetings (group discussion)&lt;br /&gt;
&lt;br /&gt;
Please note that each of the topics will be covered on an overview&lt;br /&gt;
level (due to time constraints). For future meetings, we can cover any&lt;br /&gt;
of those topics in detail. The floor will also be open to suggestions&lt;br /&gt;
for future meetings.&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23107</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23107"/>
				<updated>2007-11-05T18:29:32Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The meetings for OWASP Buffalo will be held at:&lt;br /&gt;
KnowledgeAir, LLC&lt;br /&gt;
726 Exchange St&lt;br /&gt;
Suite 628 (6th floor)&lt;br /&gt;
Buffalo, NY 14210&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is TBD.&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23106</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=23106"/>
				<updated>2007-11-05T18:28:25Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Chapter Officers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The location of the OWASP Buffalo NY chapter is TBD&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is TBD.&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=20997</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=20997"/>
				<updated>2007-08-22T05:30:08Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Chapter Officers */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:james.kist@gmail.com James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Vice President&amp;lt;/b&amp;gt; [mailto:summerk26@ecc.edu Kenneth Summers]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The location of the OWASP Buffalo NY chapter is TBD&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is TBD.&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17570</id>
		<title>OWASP Spring Of Code 2007 Applications</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Spring_Of_Code_2007_Applications&amp;diff=17570"/>
				<updated>2007-03-30T15:22:24Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;This page contains project Applications to the [[OWASP_Spring_Of_Code_2007]]&lt;br /&gt;
&lt;br /&gt;
'''If you want to apply for a SpoC 007 sponsorship you HAVE TO USE THIS PAGE for your application'''&lt;br /&gt;
&lt;br /&gt;
See [[OWASP_Spring_Of_Code_2007#How_To_Participate]] for what do to one you completed your Application&lt;br /&gt;
&lt;br /&gt;
---------&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Proposed template:''' {for longer proposals, in addition to these details you can create a PDF}:&lt;br /&gt;
&lt;br /&gt;
== {Your first name or Alias} - {Project name} ==&lt;br /&gt;
Please remember that projects will be selected and funded based on how well they meet the [[OWASP_Spring_Of_Code_2007_:_Selection|Selection Criteria]].&lt;br /&gt;
&lt;br /&gt;
You can propose your project in any form you wish, but the best proposals will be well thought out, clear and concise, and reflective of your passion for the topic.  We strongly suggest that you include the following information in your proposal.&lt;br /&gt;
&lt;br /&gt;
* Your educational and professional background&lt;br /&gt;
&lt;br /&gt;
* Application security experience and accomplishments&lt;br /&gt;
&lt;br /&gt;
* Participation and leadership in open communities&lt;br /&gt;
&lt;br /&gt;
* The opportunity, challenges, issues or need your proposal addresses&lt;br /&gt;
&lt;br /&gt;
* Objectives or ways in which you will meet the goal(s)&lt;br /&gt;
&lt;br /&gt;
* Specific activities and who will carry out these activities&lt;br /&gt;
&lt;br /&gt;
* Specific deliverables and a rough project schedule so we can track progress&lt;br /&gt;
&lt;br /&gt;
* Long-term vision for the project&lt;br /&gt;
&lt;br /&gt;
* Any other reasons why you and your project should be selected&lt;br /&gt;
&lt;br /&gt;
== Buanzo - Enigform: Firefox Addon for OpenPGP signing of HTTP requests ==&lt;br /&gt;
&lt;br /&gt;
I am a 25 year old Independent security consultant from Buenos Aires, Argentina, that has contributed to the world of&lt;br /&gt;
information systems security since 1994, when BBSes and Linux still lived together.&lt;br /&gt;
&lt;br /&gt;
A quick search for buanzo on google [http://www.google.com/search?hl=en&amp;amp;q=buanzo&amp;amp;btnG=Google+Search] will provide all necessary details about my professional and community background. For comprobable experience, you could also check my Rent a Coder profile.[http://www.rentacoder.com/RentACoder/SoftwareCoders/showBioInfo.asp?lngAuthorId=735204].&lt;br /&gt;
&lt;br /&gt;
In my free time I like playing with my Punk-Pop band [http://www.purevolume.com/futurabandapunkpop], Futurabanda. [http://www.futurabanda.com.ar], and maintaining my Restaurants, Wines and Recipes site. [http://www.vivamoslavida.com.ar]. I have to admit that my first priorities are my beloved son [http://www.fotolog.com/buanzo] and my wonderful wife [http://www.fotolog.com/buanzo].&lt;br /&gt;
&lt;br /&gt;
=== Accomplishments ===&lt;br /&gt;
&lt;br /&gt;
I've contributed scripts, fixes and translations to the Nmap project. I've also acted as Expert Contributor for SANS TOP-20 2004, 2005 and 2006. I've developed &lt;br /&gt;
tools that can be found in Freshmeat, like mprl (a getty enhancement to allow remote logins from the login: prompt of the console). I've also written&lt;br /&gt;
the Unix chapter of the OISSG's Information Systems Security Assessment Framework, v0.1 [http://www.oissg.org/content/view/71/71/]. I'm currently writing&lt;br /&gt;
an Internet Draft to be proposed for RFC regarding Enigform.&lt;br /&gt;
&lt;br /&gt;
=== Community ===&lt;br /&gt;
&lt;br /&gt;
I run the official 2600 meetings site for Argentina [http://www.2600.com/meetings/pages.html], I've been proposed, but I refused, for President of the Argentinian Free Software group called SOLAR [www.solar.org.ar]. I'm an active member of the FLOSS community since 1996, having written articles in magazines http://www.net-security.org/dl/articles/Detecting_and_Understanding_rootkits.txt, made TV, radio&lt;br /&gt;
and newspaper appearances [http://codigoabierto.bitacoras.com/archivos/2005/04/01/buanzo-hacks] and led different security research groups of Spain, Mexico and Argentina. Currently I contribute time thorugh my sites, forums and blogs,&lt;br /&gt;
answering questions in mailing lists and helping coordinate some local LUGs. I do also manager the Linux Counter for Argentina [http://counter.li.org/reports/place.php?place=AR].&lt;br /&gt;
&lt;br /&gt;
=== My Project ===&lt;br /&gt;
&lt;br /&gt;
Enigform [http://enigform.mozdev.org] is a Firefox extension that enhances HTTP with OpenPGP functionality. It digitally signs outgoing HTTP requests so that a web server can authenticate the identity and data of the incoming request. It is a Web Security tool because it can, if correctly implemented as any OpenPGP based technology, render man in the middle attacks useless. I think OpenPGP already speaks for itself regarding eMail. Imagine the same benefits for http and web applications. I think Enigform can fit into the OWASP Validation Project [http://www.owasp.org/index.php/Category:OWASP_Validation_Project].&lt;br /&gt;
&lt;br /&gt;
Enigform is the reference implementation of the Internet Draft I'm working on, in discussion with members of the IETF's OpenPGP Working Group.&lt;br /&gt;
&lt;br /&gt;
Some simple PHP code is enough to make a web application Enigform-aware [http://enigformtest.buanzo.com.ar]. The Smutty PHP MVC Framework already supports Enigform [http://smutty.pu-gh.com/demo/enigform].&lt;br /&gt;
&lt;br /&gt;
=== Long Term ===&lt;br /&gt;
&lt;br /&gt;
Have the Draft be proposed as a Standards Track RFC document, have Enigform support directly in Apache and IIS, and port Enigform to other browsers&lt;br /&gt;
and/or programming languages, and also provide OpenPGP De/Encryption support.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Why should I be selected ===&lt;br /&gt;
&lt;br /&gt;
I have the experience, security awareness and means to make this project THE web security project of the decade. I am a respected member of the&lt;br /&gt;
international security community, and I firmly believe Enigform is my greatest idea so far.&lt;br /&gt;
&lt;br /&gt;
== Eoin Keary - Code review Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I am proposing that I complete the OWASP Code review guide during this period.&lt;br /&gt;
The code review guide was started by me in 2005 and has much information on reviewing code for common vulnerabilities. It is frequently accessed (looking at the stats on the OWASP site) and therefore is useful to practitioners. &lt;br /&gt;
&lt;br /&gt;
I believe the code review guide is an integral part of the OWASP BOK (Body of Knowledge). Ensuring secure development is key to secure applications and code review is of paramount importance in this domain.&lt;br /&gt;
&lt;br /&gt;
There are many sections still to be added and more to be readjusted and rewritten to reflect the current state of the security world.&lt;br /&gt;
Much needs to be written on Web 2.0 technologies and distributed B2B technologies such as Webservices.&lt;br /&gt;
 &lt;br /&gt;
The Code review process and procedure needs also to be covered. A guide to establishing a mature code review process also needs to be done.&lt;br /&gt;
Code review methodologies also need to be discussed.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
&lt;br /&gt;
Update of the code review guide:&lt;br /&gt;
* Add additional areas relating to the code review process such as:&lt;br /&gt;
** Benefits and pitfalls&lt;br /&gt;
** Methodology&lt;br /&gt;
** The code review process&lt;br /&gt;
*** Transactional analysis&lt;br /&gt;
*** Managing the code review process&lt;br /&gt;
*** Assigning risk to findings&lt;br /&gt;
&lt;br /&gt;
** Technical guides&lt;br /&gt;
*** Language specific best practice &lt;br /&gt;
*** Java &lt;br /&gt;
*** .NET &lt;br /&gt;
*** PHP &lt;br /&gt;
*** MySQL &lt;br /&gt;
*** Stored Procs &lt;br /&gt;
*** C/C++ &lt;br /&gt;
&lt;br /&gt;
** Code review by vulnerability:&lt;br /&gt;
*** Reviewing Code for Buffer Overruns and Overflows &lt;br /&gt;
*** Reviewing Code for OS Injection&lt;br /&gt;
*** Reviewing Code for SQL Injection&lt;br /&gt;
*** Reviewing Code for Data Validation&lt;br /&gt;
*** Reviewing code for XSS issues&lt;br /&gt;
*** Reviewing Code for Error Handling&lt;br /&gt;
*** Reviewing Code for Logging Issues&lt;br /&gt;
*** Reviewing The Secure Code Environment&lt;br /&gt;
*** Reviewing code for Authorization Issues&lt;br /&gt;
*** Reviewing code for Authentication Issues&lt;br /&gt;
*** Reviewing code for Session Integrity&lt;br /&gt;
*** Reviewing code for Cross Site Request Forgery&lt;br /&gt;
*** Reviewing code for Cryptography implementation issues&lt;br /&gt;
*** Reviewing code Dangerous HTTP Methods (Deployment)&lt;br /&gt;
*** Race Conditions &lt;br /&gt;
&lt;br /&gt;
The areas of code are structured giving a brief explanation, the anti-pattern (vulnerable pattern to look for) and a suggested fix.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
&lt;br /&gt;
I used to head up the code review team as part of the application security group in fidelity investments and have 5+ years of the secure code review process. &lt;br /&gt;
I also was the lead of the Testing guide until V2 was published via the Autumn of Code. &lt;br /&gt;
&lt;br /&gt;
I have always  delivered any work I have volunteered for on time. &lt;br /&gt;
 &lt;br /&gt;
I have been involved in OWASP projects for 2/3 years now and have always been an active contributor.&lt;br /&gt;
&lt;br /&gt;
== Paolo Perego - Owasp Orizon Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
Owasp Orizon [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project] Project born in 2006 as answer to the lack of common engine and library usable by opensource code review related tools.&lt;br /&gt;
&lt;br /&gt;
I'm proposing that, during the Spring of Code 2007 period, I'll complete static analisys API and java source code enforment objects.&lt;br /&gt;
&lt;br /&gt;
Sometimes a complete code review approach is not suitable for most customers who wants to harden their code which is being approaching release stage. For such a reason, I started writing Java objects that embeds most of the security checks against common web vulnerabilities (XSS, SQL injection, Session handling, ...) so that source code can be hardened with a small effort in terms of code rewriting.&lt;br /&gt;
&lt;br /&gt;
I do believe that a common set of API and a common safe coding best practices library is one of the most important goals to bring application security to the developers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Completing the static code review API section&lt;br /&gt;
* improving programming language to XML translator&lt;br /&gt;
* improving security best practices code review scan library&lt;br /&gt;
* improving secure coding fashion best practices library&lt;br /&gt;
* writing the pattern matching scan using the aformentioned libraries&lt;br /&gt;
Writing the java source code enforment objects&lt;br /&gt;
* writing an object to handle form data values to avoid XSS&lt;br /&gt;
* writing an object to handle form data values to avoid SQL Injection&lt;br /&gt;
* writing an object to handle HttpRequest and HttpSession objects&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
Owasp Orizon is the first Owasp project I'm involved in. I'm also contributor of Owasp Italian chapter managed by Matteo Meucci and I'm talking at various speeches about application security and safe coding best practices.&lt;br /&gt;
&lt;br /&gt;
I'm a security consultant working in ethical hacking and we're approaching code review and safe topics right now.&lt;br /&gt;
I'm a developer too so I understand also the &amp;quot;dark side&amp;quot; of the problem developing code with security in mind.&lt;br /&gt;
&lt;br /&gt;
I work using the &amp;quot;release early release often&amp;quot; paradigm so to be concrete and let other people having something usable to work with.&lt;br /&gt;
&lt;br /&gt;
== Sebastien Deleersnyder - OWASP Education Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
This Education project aims to provide in building blocks of web application security information. These modules can be combined together in education tracks targeting different audiences. &lt;br /&gt;
&lt;br /&gt;
Web Application Security Education and Awareness is needed throughout the entire organization, each area and level of organizations have specific needs and requirements regarding education. A manager needs other information than a security professional or developer. Novices to the profession require other training than people with several years of experience. &lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
Currently the project goals are to create Educational Tracks: &lt;br /&gt;
* Complete the [[OWASP Education Presentation|consolidation page of OWASP presentations]] performed in the past&lt;br /&gt;
* A &amp;quot;Web Application Security Primer&amp;quot; Track for beginners (4 hours) &lt;br /&gt;
* A &amp;quot;What developers should know on Web Application Security&amp;quot; Track for developers (4 hours) &lt;br /&gt;
&lt;br /&gt;
* '''Why you should be sponsored for the project''': &lt;br /&gt;
I started the successful Belgian Chapter 3 years ago and have actively contributed to OWASP since then. I also co-organized the European conference last year in Belgium.&lt;br /&gt;
&lt;br /&gt;
This is the first separate project that I started, originating from a local demand to set up educational tracks for people that are new to Web Application Security. There are literally hundreds of presentations and an enormous amount of information on the OWASP web site. The goal of this project is to restructure pieces of that information in reusable modules that can be combined in educational tracks. It is my believe that awareness is an important cornerstone of building secure web applications, and this project will actively support that.&lt;br /&gt;
&lt;br /&gt;
If we are granted Spoc 007 participation, I will be sharing the budget with all active participants. This will be an extra motivation for project participation. I will reinvest my part in the project to set up a web conferencing / web casting solution to be used to disseminate the project results and make them available for later use.&lt;br /&gt;
&lt;br /&gt;
* '''More details''': &lt;br /&gt;
The detailed [[OWASP Education Project Roadmap|road map]] can be found here.&lt;br /&gt;
The SpoC 007 goal is to finish Sub Goals 1, 2, 3 and 4. If time permits we can start with sub goal 5.&lt;br /&gt;
&lt;br /&gt;
== Subere - OWASP JBroFuzz Project ==&lt;br /&gt;
&lt;br /&gt;
==== Overview ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz is a stateless network protocol fuzzer that emerged from the needs of penetration testing. The purpose of this application is to provide a single, portable application that offers stable cross-platform network protocol fuzzing capabilities. At the same time, JBroFuzz attempts to keep the User Interface (UI) as intuitive as possible.&lt;br /&gt;
&lt;br /&gt;
==== Fuzzing ==== &lt;br /&gt;
&lt;br /&gt;
As seen by the emphasis given on the subject of fuzzing in the 2007 Testing Guide (v2), network protocol fuzzing serves as a fundamental cornerstone of application security testing. For this, many different categories and types of fuzzing have been defined.&lt;br /&gt;
&lt;br /&gt;
==== Objectives ==== &lt;br /&gt;
&lt;br /&gt;
JBroFuzz needs to expand and grow in order to cover network fuzzing in a more complete manner. Its modular implementation allows for the addtion of new functionality by means of independent tabs. The key tabs proposed to be added during the spring of code 2007 are (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab'''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab'''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing using HTTPClient'''&lt;br /&gt;
* '''Blind SQL Injection Fuzzing Tab'''&lt;br /&gt;
&lt;br /&gt;
At the same time, the following existing tabs need to be updated and made more robust (details in next section):&lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs'''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue'''&lt;br /&gt;
* '''Update Generators file format'''&lt;br /&gt;
* '''Include SOAP and XML fuzzing'''&lt;br /&gt;
&lt;br /&gt;
This expansion process relates to stabilising code that is presently included in JBroFuzz, thus allowing it to run for extensive periods of time (24h+) as well as adding more functionality in terms of the three new tabs.&lt;br /&gt;
&lt;br /&gt;
==== Deliverables ==== &lt;br /&gt;
&lt;br /&gt;
Based on the above, the new code elements that will be added are as follows:&lt;br /&gt;
&lt;br /&gt;
* '''Open Source Tab:''' ''Provide the ability to enumerate e-mails from newsgroups without breaching google automated search rules''&lt;br /&gt;
* '''NTLM Brute Force over HTTP/S Tab:''' ''Provide the ability to enumerate NTLM as well as brute over HTTP/S NTLM.''&lt;br /&gt;
* '''Pure HTTP/S Fuzzing:''' ''Implement a fuzzing tab utilising HTTPClient from Jakarta that will also allow for multi-threading''&lt;br /&gt;
* '''Blind SQL Fuzzing Tab''' ''Implement a tab that extracts information from a blind SQL injection point identified on web server over HTTP/HTTPS.''&lt;br /&gt;
&lt;br /&gt;
For updating existing code elements that require a partial rewrite, the following areas of focus are presented in detail: &lt;br /&gt;
&lt;br /&gt;
* '''TCP Fuzzing tab allowing graph outputs:''' ''Provide the ability to graph fuzzing results during a particular session run. This will give the ability to integrate and pickup potential fuzzing patterns.''&lt;br /&gt;
* '''TCP Sniffing tab update thread Agent Queue:''' ''Update the code of the sniffing panel in order to handle threaded agents in a more memory efficient way.''&lt;br /&gt;
* '''Update Generators file format:''' ''Update the generators file format to allow for the parsing and creation of recursive generators.''&lt;br /&gt;
* '''Include SOAP and XML fuzzing:''' ''Include an up to date list of SOAP and XML fuzzing templates.''&lt;br /&gt;
&lt;br /&gt;
Overall, the above two lists of changes should provide sufficient complexity and output for the spring of code 2007, forming a challenging implementation project.&lt;br /&gt;
&lt;br /&gt;
==== Background ==== &lt;br /&gt;
&lt;br /&gt;
In its short life, the OWASP JBroFuzz Project has attracted the interest of the online security community with a total of appr. 5000 downloads in the last months. &lt;br /&gt;
&lt;br /&gt;
Coming from a strong java background (5+ years) I decided to implement and release JBroFuzz in order to initially simplify penetrations testing processes that relate to web application and network protocol fuzzing.&lt;br /&gt;
&lt;br /&gt;
I see the spring of code 2007 as a unique opportunity to industrialise network protocol fuzzing (and in particular HTTP/S fuzzing) within a single application, residing within OWASP.&lt;br /&gt;
&lt;br /&gt;
==== Why should JBroFuzz be sponsored? ==== &lt;br /&gt;
&lt;br /&gt;
Centralising fuzzing resources into one application that has the ability to handle network protocol fuzzing over HTTP and HTTPS in a simple and intuitive manner forms an area of focus that should not be dismissed in building secure software applications.&lt;br /&gt;
&lt;br /&gt;
Keep the code platform independent adds a huge advantage. &lt;br /&gt;
&lt;br /&gt;
Receving an OWASP grant from the spring of code 2007 will trigger a share in the budget with all active participants depending on their level of involvement. This will be a direct function of the number of tabs and/or user functionality that they have assisted in implementing.&lt;br /&gt;
&lt;br /&gt;
== Joshua Perrymon - OWASP LiveCD Project ==&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I am proposing that I complete the second version of the OWASP LiveCD during this period.&lt;br /&gt;
The first version of the LiveCD is now available and include many of the current OWASP documents and tools. I believe the LiveCD is one of the best mediums to promote OWASP tools and documentation. It is portable and already being used by thousands of security proffesionals to perform application testing and training. &lt;br /&gt;
&lt;br /&gt;
In the current state the CD is stable and contains a lot of tools. However, this is just the beginning. There is a LOT of work that needs to be completed. The entire CD experience needs to be branded using OWASP graphics. This shouls start with the boot screen and carry all the way through to the icons and desktop graphics. The CD should also inlcude the wiki and ALL the tools developed for OWASP.&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
&lt;br /&gt;
Update of the LiveCD:&lt;br /&gt;
* Complete OWASP branding&lt;br /&gt;
* Add OWASP wiki&lt;br /&gt;
* Add encryption capabilities&lt;br /&gt;
* Add more OWASP tools&lt;br /&gt;
* Add more pen-test tools such as;&lt;br /&gt;
 VOIP, RFID, BlueTooth, Wireless, etc..&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project''':&lt;br /&gt;
&lt;br /&gt;
I had the idea of the LiveCD about a year ago and have worked very hard to get the first version developed. This was driven by my vision to make all of the OWASP tools available on a portable medium. The main difference in the OWASP liveCD vs. other live CDs is going to be the regularity of updates. If sponsorship can be obtained the CD could be updated on a monthly basis. Not once a year like other liveCDs. The CD will also include specialty tools and documentation to perform VOIP, RFID,Bluetooth, and wireless security assessments.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
== Mark Curphey – The OWASP Web Security Certification Framework ==&lt;br /&gt;
&lt;br /&gt;
'''Problem'''&lt;br /&gt;
 &lt;br /&gt;
PCI DSS is attracting a lot of criticism for a lot of valid reasons. &lt;br /&gt;
 &lt;br /&gt;
http://securitybuddha.com/2007/03/23/the-problems-with-the-pci-data-security-standard-part-1/&lt;br /&gt;
&lt;br /&gt;
http://blogs.csoonline.com/node/210&lt;br /&gt;
&lt;br /&gt;
http://www.computerweekly.com/blogs/stuart_king/2007/03/more-on-pci---the-audit-guide.html&lt;br /&gt;
&lt;br /&gt;
The list is of course long and not appropriate here……and while its easy to knock PCI, there is nothing better out there. &lt;br /&gt;
&lt;br /&gt;
'''Solution and Deliverables'''&lt;br /&gt;
&lt;br /&gt;
As opposed to me continuing saying what’s wrong with PCI DSS, it seems to me that OWASP is a perfect forum to simply create and publish a “better criteria”. This can either be adopted and implemented by an organization like OWASP or considered to be incorporated into the PCI or other security standards. We won't get bogged down in the politics up-front, but hold something good up to the world for people to adopt. This project would of course draw on and bring together many of the other OWASP Projects including the Guide (What is a secure web app), Testing Guides (How to test for a secure web app), WebGoat (part of how to certify an individual understands and can find web app issues) etc. Many of those projects may not be complete or a perfect fit today, but this project can bring a common connecting theme to a lot of very valuable IP that OWASP has built over the years. I will also create it in such as way that a corporate could adopt/adapt it themseles as well as an industry. Where other OWASP projects are not complete or currently suitable I will build a requirements doc that can be considered by those teams if they feel appropriate. &lt;br /&gt;
&lt;br /&gt;
This project would address the;&lt;br /&gt;
&lt;br /&gt;
'''Standard''' &lt;br /&gt;
*A complete auditable (important) web site security standard suitable for modern e-commerce companies including&lt;br /&gt;
**The technical things people should care about&lt;br /&gt;
**The operational  / management things people should care about&lt;br /&gt;
'''Certification Model''' &lt;br /&gt;
*A complete framework for certification (ongoing) and implementation (including certifying auditors, ongoing validation etc). This will include for example the model for certifying auditors (including the actual test program); checklists and forms for auditors to complete and other supporting material. &lt;br /&gt;
&lt;br /&gt;
Essentially its a complete blueprint for an organisation like OWASP or a regulatory body need to run a web site security certification program complete with the supporting material to implement it.&lt;br /&gt;
&lt;br /&gt;
Note:  This is no trivial task to get right. I would need to ensure I can commit to completing the work to a good quality. I think this will take at least 2 months from start to finish to complete but I think is very important for the industry and for potentially for OWASP.  I wanted to gauge the interest by first posting this.&lt;br /&gt;
&lt;br /&gt;
== Erwin Geirnaert - OWASP Java Project ==&lt;br /&gt;
&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
I would like to help the OWASP Java Project to gather all Java security related information and to document any domains that lack documentation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
The main objective I see is to gather all information in one place, where security experts and developers can find the information they need.&lt;br /&gt;
In order to get there, I need to collect all information in the OWASP Wiki, ask people if they want to donate it to OWASP so that we can include it as public material, add URLs, white-papers, references to books, ... And if time permits, write some documentation myself.&lt;br /&gt;
&lt;br /&gt;
One deliverable is the OWASP Top 10 for J2EE applications with clear examples of vulnerabilities and mitigations.&lt;br /&gt;
&lt;br /&gt;
* '''Why you should be sponsored for the project''':&lt;br /&gt;
I have more then 10 years experience in Java and J2EE and the last 6 years I have tested and broke a lot of web applications. I gave also some very successful J2EE security courses and web security courses. I spoke at different conferences about application security in Europe.&lt;br /&gt;
And I am responsible for the security track at Javapolis, one of the biggest Jave conferences in Europe.&lt;br /&gt;
I am the co-founder of ZION SECURITY where we do security testing, code review, design reviews, training,...&lt;br /&gt;
I'm also member of the OWASP Belgium board that started in March 2007.&lt;br /&gt;
&lt;br /&gt;
== Erwin Geirnaert - OWASP WebGoat Solutions Guide ==&lt;br /&gt;
&lt;br /&gt;
* '''Executive Summary''':&lt;br /&gt;
WebGoat is used by a lot of people to learn about web application security and the different vulnerabilities. But it takes a lot of time to grasp how the tools like WebScarab work and how to use them effectively in WebGoat. I propose to create a walkthrough of the lessons in WebGoat so that people can learn from the solutions, without spoiling the fun.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables''':&lt;br /&gt;
The WebGoat Solutions Guide is a document that can be bundled with WebGoat. Each lesson contains a detailed solution with screenshots and tools. I created a PDF with the solution for WebGoat 4.0 but this is too big to load (15 MB) and is not very practical.&lt;br /&gt;
&lt;br /&gt;
After a discussion with Bruce about this, we think that the solutions should be made like the existing Lessons Plan so it is easier to maintain and update when a lesson changes. This means that there will be documentation folder and an individual solution for each lesson. &lt;br /&gt;
&lt;br /&gt;
* '''Why you should be sponsored for the project''':&lt;br /&gt;
I have more then 10 years experience in Java and J2EE and the last 6 years I have tested and broke a lot of web applications. I gave also some very successful J2EE security courses and web security courses. I spoke at different conferences about application security in Europe.&lt;br /&gt;
And I am responsible for the security track at Javapolis, one of the biggest Jave conferences in Europe.&lt;br /&gt;
I am the co-founder of ZION SECURITY where we do security testing, code review, design reviews, training,...&lt;br /&gt;
I'm also member of the OWASP Belgium board that started in March 2007.&lt;br /&gt;
&lt;br /&gt;
== Bunyamin Demir – OWASP WeBekci Project ==&lt;br /&gt;
&lt;br /&gt;
==== Executive Summary: ====&lt;br /&gt;
&lt;br /&gt;
Web application firewalls (WAF) are gaining importance among the information security technologies designed to protect web sites from attack. WAF solutions prevent attacks that network firewalls and intrusion detection systems can't and they require no modification of application source code. ModSecurity [http://www.modsecurity.org/] is an open source web application firewall that runs as an Apache module. It is an embeddable web application firewall and it provides protection from a range of attacks against web applications. It is an open source project available to everyone; it however does not come with an admin panel. &lt;br /&gt;
&lt;br /&gt;
I decided to provide this essential tool with a control panel which I believe will ease and thus encourage its usage.&lt;br /&gt;
&lt;br /&gt;
ModSecurity allows for HTTP traffic monitoring and real-time analysis with no changes to existing infrastructure. My main goal is to analyze attacks and generate rules to change the configuration of the ModSecurity accordingly.&lt;br /&gt;
&lt;br /&gt;
ModSecurity  has a feature called “flexible rule engine” as its heart of Attack Prevention capability . It uses ModSecurity’s “Rule Language,” (a programming language designed to work with HTTP transaction data). It is easy to use and flexible; yet the system administrators need to learn its own rules to create what is called “Certified ModSecurity Rules” to be implemented. My control panel will automate the major code-generation in Rule Language. &lt;br /&gt;
&lt;br /&gt;
==== Objectives and Deliverables: ====&lt;br /&gt;
&lt;br /&gt;
* '''Configuration''' : Will add all configuration parameter&lt;br /&gt;
* '''Rule Generator''': Will write all the Rules in Rule Language&lt;br /&gt;
* '''Logging'''       : Auditlog and debuglog will be added.&lt;br /&gt;
* '''Multiple-DB'''   : Will add PostgreSql and Sqlite support.&lt;br /&gt;
&lt;br /&gt;
==== Why I should be sponsored for the project: ====&lt;br /&gt;
&lt;br /&gt;
I am  involved with OWASP Turkey [http://www.owasp.org/index.php/Turkey] and interested very much in WAF. Even though this is my first project for OWASP, I am very much interested in every aspect of ModSecurity. With SpoC007’s support I will finalize my work on OWASP WeBekci [http://www.owasp.org/index.php/Category:OWASP_WeBekci_Project].&lt;br /&gt;
&lt;br /&gt;
== Eric Sheridan and Dr. Goran Trajkovski - The Scholastic Application Security Assessment Project ==&lt;br /&gt;
&lt;br /&gt;
=== ABSTRACT ===&lt;br /&gt;
&lt;br /&gt;
One of the major goals of the Open Web Application Security Project is to educate developers in the field of application software security. Understanding the risks and threats associated with web application software is pivotal in building a mature application security process. While OWASP has made a significant impact in the professional industry, more time and energy should be focused towards the academic community. It is an unfortunate fact that most universities do not require a stringent software security course for their computer science students. Consequently, most young developers do not have the ability to assess and mitigate the risks and threats for their own applications. It is for this reason that we believe the Open Web Application Security Project should fund an initiative to encourage the adaptation of application software security methodologies in the academic course curriculum.&lt;br /&gt;
&lt;br /&gt;
The Scholastic Application Security Project is intended to be the first step towards integrating security requirements in academic course curriculums. The primary goal of the project is to give students hands-on experience performing application security assessments using the tools and documentation found at http:///www.owasp.org. The assessment, lead by an application security professional, will demonstrate to students how the information and tools found at OWASP can be used to assess and ultimately increase the overall security posture of a web application. &lt;br /&gt;
&lt;br /&gt;
This project contributes towards bridging the gap between academia and industry, by equipping students with hands-on ready-for-the-job-market skills in the application software securing industry.&lt;br /&gt;
&lt;br /&gt;
=== PARTICIPANTS ===&lt;br /&gt;
&lt;br /&gt;
The Scholastic Application Security Assessment Project requires that college level students, lead by an application security professional, perform a security audit on an open source web application using the tools and information available at OWASP.&lt;br /&gt;
&lt;br /&gt;
::*'''Application Security Professional''' – Eric Sheridan ([http://www.aspectsecurity.com Aspect Security])&lt;br /&gt;
::*'''Towson University (TU) Partner''' – Dr. Goran Trajkovski, Towson University (http://www.towson.edu)&lt;br /&gt;
::*'''Students''' – Students of TU’s Application Software Security Course (COSC 458), nominated by the TU Partner&lt;br /&gt;
::*'''Web Application''' – The Open WebMail Project (http://openwebmail.org/)&lt;br /&gt;
&lt;br /&gt;
=== OWASP UTILIZATION ===&lt;br /&gt;
&lt;br /&gt;
The Scholastic Application Security Assessment Project requires heavy utilization of existing OWASP tools and utilities. Through this requirement, the project will illustrate the fact that existing OWASP resources can be used and heavily relied upon in a professional security audit. The following is a list of notable OWASP resources whose use will be documented throughout the assessment:&lt;br /&gt;
&lt;br /&gt;
::*'''OWASP Top Ten 2007''' - The security critical areas that the students will assess in the review&lt;br /&gt;
::*'''OWASP Testing Guide v2''' – The primary resource for building penetration testing cases&lt;br /&gt;
::*'''OWASP Guide''' – The primary resource for technical details pertaining to a technology and/or vulnerability&lt;br /&gt;
::*'''OWASP WebScarabNG''' – The primary proxy utility used throughout the assessment&lt;br /&gt;
&lt;br /&gt;
=== THE FINAL REPORT ===&lt;br /&gt;
&lt;br /&gt;
Students are required to follow the principle of “responsible disclosure” during the course of the security assessment. The developers of the open source application will be notified if any significant issues are found. Once the assessment is complete, a final report will be delivered to the application developers and the appropriate OWASP Spring of Code personnel. For each finding in the report, the students will be required to describe how the tools and information found at OWASP were used in the discovery.&lt;br /&gt;
&lt;br /&gt;
=== HOW DOES OWASP BENEFIT? ===&lt;br /&gt;
&lt;br /&gt;
The Scholastic Application Security Assessment Project is specifically designed to benefit the OWASP brand:&lt;br /&gt;
&lt;br /&gt;
''The OWASP Community…''&lt;br /&gt;
::*will be provided a case study proving that the resources available at OWASP can be utilized in an academic  environment, that can be later used in advertising the OWASP efforts to similar programs as the one at TU.&lt;br /&gt;
::*will be providing students a hands on experience in learning and testing for the latest web application security threats, thus potentially enlarging the OWASP community of contributors and supporters.&lt;br /&gt;
::*will be addressing the need to educate developers in the security critical areas.&lt;br /&gt;
::*will be seen as offering a professional level service to another open source project.&lt;br /&gt;
::*will be addressing one of the root causes of application software insecurity.&lt;br /&gt;
&lt;br /&gt;
=== BACKGROUND ===&lt;br /&gt;
&lt;br /&gt;
'''Eric Sheridan:'''&lt;br /&gt;
&lt;br /&gt;
::*Earned a Bachelor’s of Science in Computer Science from Towson University&lt;br /&gt;
::*Graduate Student in Information Security at Johns Hopkins University&lt;br /&gt;
::*Application Security Engineer at Aspect Security&lt;br /&gt;
::*Lead of the OWASP Stinger Project and the OWASP Validation Project&lt;br /&gt;
&lt;br /&gt;
'''Goran Trajkovski, PhD:'''&lt;br /&gt;
&lt;br /&gt;
::*Has been teaching the Application Software Security course for the Computer Security undergraduate and master-level majors at TU since 2004 (TU has been a Center of Excellence in Information Assurance, designated by the NSA since 2002).&lt;br /&gt;
::*Assistant professor of Computer and Information Sciences at Towson University, and Director of its Cognitive Agency and Robotics Lab (CARoL).&lt;br /&gt;
::*Has lead curricular efforts in integrating application software security topics throughout the Computer Science and Computer Information Sciences curriculum&lt;br /&gt;
::*12 years of full time teaching experience in higher ed.&lt;br /&gt;
&lt;br /&gt;
==Boris - OWASP Site Generator==&lt;br /&gt;
OWASP Site Generator is a great tool, but it could be even better and more widespread. There’s a lot room for improvements to both its functionality and user experience. The way I see it, main user needs to be addressed and specific development objectives for the next release of OWASP Site Generator would be:&lt;br /&gt;
===User Needs===&lt;br /&gt;
*Create multiple types of sites easily&lt;br /&gt;
*Track and analyze requests easily&lt;br /&gt;
*Change the look and feel of the resulting sites easily&lt;br /&gt;
*Create sites for multiple web backend technologies easily&lt;br /&gt;
*Learn how to use OWASP Site Generator easily&lt;br /&gt;
&lt;br /&gt;
===Development Objectives===&lt;br /&gt;
*Create a vulnerability library that can be used for web services, HTML forms, AJAX, etc. instead of having to craft the same attack for each&lt;br /&gt;
*Add support for logging of all received requests, as well as querying resulting log files&lt;br /&gt;
*&amp;amp;quot;Templatize&amp;amp;quot; the code generation process, so it can support skinning of the resulting sites&lt;br /&gt;
*&amp;amp;quot;Templatize&amp;amp;quot; the code generation process, so it can support different backend web technologies&lt;br /&gt;
*Fix all significant defects in the current release of OWASP Site Generator&lt;br /&gt;
*Redesign the GUI to make it more efficient and user friendly&lt;br /&gt;
*Create a smooth setup program which would install both client and server components as effortlessly as possible&lt;br /&gt;
*Write documentation and articles about it&lt;br /&gt;
*Make the development process open to the public and, hopefully, driven by its feedback from day one&lt;br /&gt;
&lt;br /&gt;
===Why should I be sponsored for this project===&lt;br /&gt;
Well, probably because of my past work on AoC (I just hope that won’t be the reason for me ''not'' to be sponsored :)&lt;br /&gt;
&lt;br /&gt;
==Boris - OWASP Report Generator==&lt;br /&gt;
There is no doubt that OWASP Report Generator is a very handy tool for penetration testers and other security researchers, but it would be even better if some enhancements were made:&lt;br /&gt;
===User Needs===&lt;br /&gt;
*More robustness&lt;br /&gt;
*Ease of use (more efficient and intuitive GUI)&lt;br /&gt;
*Automated reporting for some typical (or not so typical) scenarios&lt;br /&gt;
*More documentation&lt;br /&gt;
*More samples&lt;br /&gt;
&lt;br /&gt;
===Development Objectives===&lt;br /&gt;
*Redesign the GUI to make it more efficient and user friendly&lt;br /&gt;
*Clean up the code&lt;br /&gt;
*Add functionality to import, execute and create reports for OWASP Tiger automated tests&lt;br /&gt;
*Create some samples&lt;br /&gt;
*Create a smooth setup program&lt;br /&gt;
*Write documentation and articles about it&lt;br /&gt;
*Make the development process open to the public and, hopefully, driven by its feedback from day one&lt;br /&gt;
===Why should I be sponsored for this project===&lt;br /&gt;
Well, probably because of my past work on AoC (I just hope that won’t be the reason for me ''not'' to be sponsored :)&lt;br /&gt;
&lt;br /&gt;
==Boris - OWASP Tiger==&lt;br /&gt;
OWASP Tiger project is at its very beginning. Some new features are needed in order for it to become more useful. Here’s a short list:&lt;br /&gt;
===User Needs===&lt;br /&gt;
*Easier editing of test projects&lt;br /&gt;
*Support for testing sites that require authentication&lt;br /&gt;
*Support for testing sites that require use of cookies&lt;br /&gt;
*An easy way of specifying vulnerability data, ideally an automated one&lt;br /&gt;
*More flexible reporting&lt;br /&gt;
*More project templates&lt;br /&gt;
*More documentation&lt;br /&gt;
===Development Objectives===&lt;br /&gt;
*Add support for cookies&lt;br /&gt;
*Add support for standard authentication schemes&lt;br /&gt;
*Add support for importing vulnerability data from a test definition (or a vulnerability library)&lt;br /&gt;
*Make use of OWASP Report Generator for more advanced reports&lt;br /&gt;
*Create a setup program that would install both client and project templates and also allow for adding new templates after the initial installation&lt;br /&gt;
*Write documentation and articles about it&lt;br /&gt;
*Make the development process open to the public and, hopefully, driven by its feedback from day one&lt;br /&gt;
===Why should I be sponsored for this project===&lt;br /&gt;
Well, probably because of my past work on AoC (I just hope that won’t be the reason for me ''not'' to be sponsored :)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
==Heiko - Web Application Security put into practice==&lt;br /&gt;
I'm trying to make the OWASP Top Ten and Guide project known in the programming community, but I understand that clear examples in the specific programming language and best practices with explanation educate the best. I'm at the chair for secure software at my university and I want to contribute practical examples, because I believe not to teach secure programming is a great oversight in today's education. Not only the programmers in large companies have to be aware of security impacts, but also their future employees and their freelance programmers. I'm with a large organization of freelance programmers, which I want to make aware of security flaws.&lt;br /&gt;
&lt;br /&gt;
The Ruby on Rails Security project [http://www.rorsecurity.info/] started this year and is the only security initiative for Ruby on Rails. Ruby is the fastest growing level A programming language, according to the Tiobe programming community index [http://www.tiobe.com/tpci.htm], partly because of its advertised simplicity. This is dangerous, as programmers could be enticed to do cargo cult programming [http://en.wikipedia.org/wiki/Cargo_cult_programming] without knowing the security impacts. I found several security holes in popular modules, and even the Rails framework itself generates potentially insecure code. Nevertheless, Rails provides good means against many of the OWASP Top Ten security flaws, but I believe these means have to be popularized much more.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
===Objectives and Deliverables===&lt;br /&gt;
* Create a security guide to the most popular web server software, Apache&lt;br /&gt;
** Installation&lt;br /&gt;
** secure configuration, emphasis on Rails, but not limited to it&lt;br /&gt;
** file system privileges for Rails and Apache&lt;br /&gt;
** anti profiling techniques for Apache&lt;br /&gt;
** Modules and Mod_security configuration&lt;br /&gt;
&lt;br /&gt;
* Create a security guide to the popular database software, MySQL, as practical contribution to the OWASP Top 10 Insecure storage section&lt;br /&gt;
** Installation&lt;br /&gt;
** secure configuration, emphasis on Rails, but not limited to it&lt;br /&gt;
** file system privileges for Rails and MySQL&lt;br /&gt;
** MySQL access restriction techniques&lt;br /&gt;
** encryption methods&lt;br /&gt;
&lt;br /&gt;
* Ruby on Rails security guide and code examples, with at least the following topics:&lt;br /&gt;
** Anti profiling techniques&lt;br /&gt;
** Rails routes security&lt;br /&gt;
** error handling and presentation, as in OWASP Top 10 Improper Error Handling&lt;br /&gt;
** OWASP Top 10: XSS in Rails&lt;br /&gt;
** OWASP Top 10: SQL injection in Rails&lt;br /&gt;
** OWASP Top 10: Parameter injection in Rails&lt;br /&gt;
** OWASP Top 10: Session handling in Rails&lt;br /&gt;
** OWASP Top 10: Access control in Rails&lt;br /&gt;
** handling of files&lt;br /&gt;
** integrity&lt;br /&gt;
** encryption and SSL&lt;br /&gt;
** logging flaws&lt;br /&gt;
** Ajax security&lt;br /&gt;
&lt;br /&gt;
* Code &amp;amp; other&lt;br /&gt;
** means to check the security of MySQL&lt;br /&gt;
** input validation guide, and implement it in Ruby&lt;br /&gt;
** update the poorly documented guide at http://manuals.rubyonrails.com/read/chapter/40 which is the only official guide to security&lt;br /&gt;
** usage guide for OWASP tools, also in connection with Rails&lt;br /&gt;
** make the results known in the several communities I'm in&lt;br /&gt;
** if applicable: submit code to Rails for security holes found&lt;br /&gt;
&lt;br /&gt;
===Why I should be sponsored for the project===&lt;br /&gt;
I have been programming professionally for 10 years and created several software products, including Internet applications, and I always focused on security. I am currently graduating university, my thesis is about web application security. Recently, I started the Ruby on Rails security project, which is the only security project for Rails. I have always delivered my work on time, and I believe I have the knowledge to deliver good quality.&lt;br /&gt;
&lt;br /&gt;
===Long-term vision for the project===&lt;br /&gt;
Make it available to the community and accept security notices and best practices from other users to constantly improve it.&lt;br /&gt;
&lt;br /&gt;
===Benefits to the OWASP===&lt;br /&gt;
* practical guides on how to put security into practice: the most popular web server software Apache and the popular database software MySQL&lt;br /&gt;
* if applicable: additional examples and chapters for the OWASP Guide&lt;br /&gt;
* the first and only fully-fledged security guide to a programming language and framework which is used by many large companies&lt;br /&gt;
* security awareness of future employees and freelancers&lt;br /&gt;
* more exposure of the OWASP&lt;br /&gt;
&lt;br /&gt;
==Denis – Python Tainted Mode==&lt;br /&gt;
I am graduate student of Moscow State University, department of Computational Mathematics and Cybernetics.&lt;br /&gt;
My graduate work is dedicated to web-application security. The goal of my graduate work is to combine dynamic code analysis with penetration testing to provide more precise analysis.&lt;br /&gt;
This work will help to find security vulnerabilities in web-applications.&lt;br /&gt;
I successfully presented parts of my work at university conferences.&lt;br /&gt;
&lt;br /&gt;
===My Project===&lt;br /&gt;
The goal of my project is to create analog of Perl’s Taint Mode for Python programming language.&lt;br /&gt;
Taint mode is successfully used in Perl, PHP, and Ruby to find input validation vulnerabilities in web-applications (see for ex. PHPRevent[http://dependability.cs.virginia.edu/info/PHPrevent]).&lt;br /&gt;
Unfortunately there is no implementation of Taint Mode for Python language despite of wide spread of Python-based web-applications. Taint Mode for Python is highly claimed.&lt;br /&gt;
I plan to modify Python interpreter and add Taint label propagation. Then I’ll add three configuration lists:&lt;br /&gt;
* List of sources. All data emanating from sources must be marked tainted.&lt;br /&gt;
* List of critical functions, that shouldn’t receive tainted data.&lt;br /&gt;
* List of sanitizing functions that untaints data.&lt;br /&gt;
These three lists are dependent on technology that is used between web-server and web-applications in web server. In my project I plan to build such lists for mod_python and then broaden for other technologies. With switched on taint mode web-application will receive exceptions when critical function receives tainted data.&lt;br /&gt;
&lt;br /&gt;
===Why should I be selected===&lt;br /&gt;
I have strong mathematical &amp;amp; computer science background. I’m familiar with research publications on dynamic analysis and with implementation of taint mode in Perl and PHP (PHPrevent Project).&lt;br /&gt;
This project is part of my work at university. It will be made under mentoring of my scientific advisor.&lt;br /&gt;
This work is already practically done that’s why I’m sure I will finish my project in time.&lt;br /&gt;
I have strong skills in developing projects with Python, Java, C, C++, and Assembler. Then I plan to support, develop and enhance my project and increase its quality with penetration testing.&lt;br /&gt;
&lt;br /&gt;
If you have any questions or would like further information, feel free to contact me.&lt;br /&gt;
&lt;br /&gt;
Yours faithfully,&lt;br /&gt;
Denis&lt;br /&gt;
&lt;br /&gt;
== Darren Edmonds - WebScarab NG Security Test Automation ==&lt;br /&gt;
&lt;br /&gt;
=== Background ===&lt;br /&gt;
I am a 28 year old software developer from the UK with a background in java based web development and application security testing.  I have strong mathematical skills, a degree in software engineering, a SCJP qualification and 8 years of commercial development experience.  I have created many web based and standalone applications delivering on time and adhering to common software practices.&lt;br /&gt;
I'm an avid supporter of open source software and try to use it whenever possible in a commercial environment.  I've made contributions to the Geotools mapping project, written a securing tomcat article for OWASP and developed a full modification for the first person shooter Quake 3.&lt;br /&gt;
&lt;br /&gt;
=== Project Details ===&lt;br /&gt;
Having used numerous penetration testing applications I believe there is a need for an open source application which supports some, or all, of the features of the more expensive commercial products.  I propose to make WebScarab generate, record, and playback security test cases so that regression testing is possible.  If time permits I would also like to include some extra automated tests that are not always feasible during manual testing; searching for backup files (~, Copy of X), checking non-authorised access to authorised areas, common and brute force name directory searching, etc.  Perhaps include the ability to read the test database of other scanning tools such as nikto.&lt;br /&gt;
I have already made contact with Rogan Dawes, original WebScarab NG author, to discuss some initial ideas.  I believe it is important that Rogan is consulted during the initial planning phase to make sure the project keeps to a set of consistent guidelines.&lt;br /&gt;
&lt;br /&gt;
=== Milestones ===&lt;br /&gt;
* Research regression testing features in other applications&lt;br /&gt;
* Create a functional specification&lt;br /&gt;
* Build testing framework (possible inclusion of scripting language for user defined tests)&lt;br /&gt;
* Testing&lt;br /&gt;
&lt;br /&gt;
=== Why I Should be Sponsored ===&lt;br /&gt;
I believe I am an ideal candidate to develop the proposed additions to WebScarab NG, not just because of my qualifications and experience, but because I plan to use WebScarab NG in my work to help perform the initial testing of web applications.  As well as my own time my current employer will allocate me a set amount of time to ensure the project achieves its milestones.&lt;br /&gt;
The end result will make WebScarab NG a much more powerful testing tool and will be a great asset to the OWASP community.  With continued development and input from the community I see no reason why WebScarab NG cannot rival commercial testing application features, usability, and business benefit.  Increasing WebScarab's features will result in increased community awareness bringing in extra developers, ensuring continual development and so the cycle starts again.&lt;br /&gt;
&lt;br /&gt;
== Bernardo - sqlmap ==&lt;br /&gt;
&lt;br /&gt;
* '''Executive Summary'''&lt;br /&gt;
[http://sqlmap.sourceforge.net sqlmap] is an automatic blind SQL injection tool, developed in python, capable to perform an active database fingerprint, to enumerate entire remote database and much more. The aim of this project is to implement a fully functional database mapper tool which takes advantages of web application programming security flaws which lead to SQL injection vulnerabilities.&lt;br /&gt;
&lt;br /&gt;
* '''Objectives and Deliverables'''&lt;br /&gt;
** Add support for Oracle database management system;&lt;br /&gt;
** Add support to extract database users password hash;&lt;br /&gt;
** Extend inband SQL injection functionality to all other possible queries;&lt;br /&gt;
** Add Microsoft SQL Server database fingerprint;&lt;br /&gt;
** Add a fuzzer class with the aim to parse html page looking for standard database error messages consequently improving database fingerprinting;&lt;br /&gt;
** Add support for SQL injection on HTTP ''Cookie'' and ''User-Agent'' headers;&lt;br /&gt;
** Add support for query ETA (Estimated Time of Arrival) real time calculation;&lt;br /&gt;
** Improve Google dorking support to take advantage of remote hosts affected by SQL injection to perform other command line argument actions;&lt;br /&gt;
** Improve logging functionality.&lt;br /&gt;
&lt;br /&gt;
* '''Long-term vision for the project'''&lt;br /&gt;
Make sqlmap available as an easy-to-use enumeration and penetration testing tool to the OWASP community extending its functionality to exploit SQL injection vulnerabilities to provide a remote shell on the affected web application database server when possible.&lt;br /&gt;
In the long run I would also like to develop a graphical user interface.&lt;br /&gt;
&lt;br /&gt;
* '''Why I should be sponsored for the project'''&lt;br /&gt;
I have good python programming skills and some years of experience in computer networks security. I spent most of the last year researching on web application insecurity taking over the [http://sqlmap.svn.sourceforge.net/viewvc/sqlmap/ sqlmap development] since December 2006. Actually I work as software developer at an information security company in Italy where I mostly deal with vulnerability assessment.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Jim - Best Practices &amp;amp; Countermeasures ==&lt;br /&gt;
&lt;br /&gt;
=== Community ===&lt;br /&gt;
I have been running the Buffalo, NY OWASP chapter since 2004. I have been President of ISACA WNY since 2005. I have delivered presentations at Buffalo ISSA, Rochester ISSA, ISACA WNY, and Buffalo OWASP meetings on the topic of Web Application Security.&lt;br /&gt;
&lt;br /&gt;
=== My Project ===&lt;br /&gt;
The Best Practices &amp;amp; Countermeasures project will outline best practices that should be followed to address/prevent known web application security issues. The best practices will be divided up into related sections. For instance, there will be an &amp;quot;Authentication&amp;quot; section that would have best practices as follows:&lt;br /&gt;
1) Require strong passwords&lt;br /&gt;
2) For sensitive sites, require two-factor authentication&lt;br /&gt;
3) For intranet sites, tie authentication into existing authentication directory server, such as LDAP.&lt;br /&gt;
4) Implement account lock-out after 5 failed login attempts&lt;br /&gt;
5) Add a log entry and/or an alert to IDS operators after 5 failed login attempts&lt;br /&gt;
6) etc.&lt;br /&gt;
&lt;br /&gt;
Each best practice could also have links to language-specific code constructs that show how to implement each best practice.&lt;br /&gt;
&lt;br /&gt;
=== Long Term ===&lt;br /&gt;
It is my hope that this project can be used not only by developers, but also by IT auditors and security professionals during audits &amp;amp; assessments&lt;br /&gt;
&lt;br /&gt;
=== Why should I be selected ===&lt;br /&gt;
I have 15 years experience in IT, with 10 years experience in IT Security. I have a bachelor's degree in Computer Science and professional experience as a programmer/developer.&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17545</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17545"/>
				<updated>2007-03-29T23:30:25Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Other Local IT Organizations */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:kist@meridiansecurity.net James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Vice President&amp;lt;/b&amp;gt; [mailto:summerk26@ecc.edu Kenneth Summers]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The location of the OWASP Buffalo NY chapter is TBD&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is TBD.&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.rochissa.org/ ISSA Rochester]&lt;br /&gt;
&lt;br /&gt;
[http://dc585.info/ Rochester, NY Defcon Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17544</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17544"/>
				<updated>2007-03-29T23:27:52Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Chapter Chair */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Officers ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;b&amp;gt;President&amp;lt;/b&amp;gt; [mailto:kist@meridiansecurity.net James Kist]&lt;br /&gt;
&amp;lt;p&amp;gt;&lt;br /&gt;
&amp;lt;b&amp;gt;Vice President&amp;lt;/b&amp;gt; [mailto:summerk26@ecc.edu Kenneth Summers]&lt;br /&gt;
&amp;lt;/p&amp;gt;&lt;br /&gt;
&lt;br /&gt;
For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send one of the officers an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The location of the OWASP Buffalo NY chapter is TBD&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is TBD.&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17543</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17543"/>
				<updated>2007-03-29T23:24:50Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Local News */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Chair ==&lt;br /&gt;
&lt;br /&gt;
The chapter is headed by [mailto:kist@meridiansecurity.net James Kist.] For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send James an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The location of the OWASP Buffalo NY chapter is TBD&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting is TBD.&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17542</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17542"/>
				<updated>2007-03-29T23:24:03Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Chapter Chair */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Chair ==&lt;br /&gt;
&lt;br /&gt;
The chapter is headed by [mailto:kist@meridiansecurity.net James Kist.] For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send James an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The location of the OWASP Buffalo NY chapter is TBD&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting will take place on Tuesday November 16th, 2004 at 6:00 PM at [http://www.mapquest.com/maps/map.adp?country=US&amp;amp;address=405+N+French+Road&amp;amp;city=Amherst&amp;amp;state=NY&amp;amp;zipcode=14228&amp;amp;homesubmit.x=28&amp;amp;homesubmit.y=6 Network Security Corp's offices.] The topic of the meeting is yet to be determined, but will definitely revolve around web application security (if you have any suggestions, please send them to the mailing list). All are invited to attend and participate. If you plan on attending, please pre-register so that we can plan accordingly and accommodate all attendees. To register, please send an email to [mailto:owasp@nsec.net owasp@nsec.net.]&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17541</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17541"/>
				<updated>2007-03-29T23:23:33Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Location */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Chair ==&lt;br /&gt;
&lt;br /&gt;
The chapter is headed by [mailto:kist@nsec.net James Kist.] For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send James an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The location of the OWASP Buffalo NY chapter is TBD&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting will take place on Tuesday November 16th, 2004 at 6:00 PM at [http://www.mapquest.com/maps/map.adp?country=US&amp;amp;address=405+N+French+Road&amp;amp;city=Amherst&amp;amp;state=NY&amp;amp;zipcode=14228&amp;amp;homesubmit.x=28&amp;amp;homesubmit.y=6 Network Security Corp's offices.] The topic of the meeting is yet to be determined, but will definitely revolve around web application security (if you have any suggestions, please send them to the mailing list). All are invited to attend and participate. If you plan on attending, please pre-register so that we can plan accordingly and accommodate all attendees. To register, please send an email to [mailto:owasp@nsec.net owasp@nsec.net.]&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17540</id>
		<title>Buffalo</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Buffalo&amp;diff=17540"/>
				<updated>2007-03-29T23:23:00Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Welcome the OWASP Buffalo NY chapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==  Welcome the OWASP Buffalo NY chapter ==&lt;br /&gt;
&lt;br /&gt;
The Buffalo NY chapter was formed in August 2004. We meet 4 times a year for 1 to 2 hours per meeting and discuss topics related to web application security.&lt;br /&gt;
&lt;br /&gt;
==  Goals &amp;amp; Objectives ==&lt;br /&gt;
&lt;br /&gt;
It is our goal to freely distribute information related specifically to web application security. We want to ensure our members receive &amp;quot;free, professional-quality, open-source documentation, tools, and standards&amp;quot;, as quoted directly from the main OWASP site. Participation is free and open to all. All are encouraged to participate.&lt;br /&gt;
&lt;br /&gt;
==  Chapter Chair ==&lt;br /&gt;
&lt;br /&gt;
The chapter is headed by [mailto:kist@nsec.net James Kist.] For information on how to join the chapter or if you would like to attend a meeting or even speak at a meeting, please send James an email. If you have any suggestions for meeting topics, please send an email with your ideas.&lt;br /&gt;
&lt;br /&gt;
==  Location ==&lt;br /&gt;
&lt;br /&gt;
The location of the OWASP Buffalo NY chapter will be at the Network Security Corp. offices at the following address:&lt;br /&gt;
&lt;br /&gt;
:: 405 N. French Road&lt;br /&gt;
:: Suite 100&lt;br /&gt;
:: Amherst, NY 14228&lt;br /&gt;
&lt;br /&gt;
[http://www.mapquest.com/maps/map.adp?country=US&amp;amp;address=405+N+French+Road&amp;amp;city=Amherst&amp;amp;state=NY&amp;amp;zipcode=14228&amp;amp;homesubmit.x=28&amp;amp;homesubmit.y=6 Mapquest Link]&lt;br /&gt;
&lt;br /&gt;
==  Local Mailing List ==&lt;br /&gt;
&lt;br /&gt;
You can sign up for the local mailing list. This list hosts discussions about chapter activity, planning for meetings and discussions about past and future presentations. To subscribe, go to http://lists.owasp.org/mailman/listinfo/owasp-buffalo and supply your email address.&lt;br /&gt;
&lt;br /&gt;
== Participation ==&lt;br /&gt;
&lt;br /&gt;
You can participate by either signing up for the mailing list or just show up for the next meeting!&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Next Chapter Meeting'''&lt;br /&gt;
&lt;br /&gt;
The next Buffalo chapter meeting will take place on Tuesday November 16th, 2004 at 6:00 PM at [http://www.mapquest.com/maps/map.adp?country=US&amp;amp;address=405+N+French+Road&amp;amp;city=Amherst&amp;amp;state=NY&amp;amp;zipcode=14228&amp;amp;homesubmit.x=28&amp;amp;homesubmit.y=6 Network Security Corp's offices.] The topic of the meeting is yet to be determined, but will definitely revolve around web application security (if you have any suggestions, please send them to the mailing list). All are invited to attend and participate. If you plan on attending, please pre-register so that we can plan accordingly and accommodate all attendees. To register, please send an email to [mailto:owasp@nsec.net owasp@nsec.net.]&lt;br /&gt;
&lt;br /&gt;
== Other Local IT Organizations ==&lt;br /&gt;
&lt;br /&gt;
[http://www.infotechniagara.org/ infoTech Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://dnug.infotechniagara.org/ infoTech Niagara .NET Users Group]&lt;br /&gt;
&lt;br /&gt;
[http://www.isacawny.org/ ISACA WNY]&lt;br /&gt;
&lt;br /&gt;
[http://www.issabuffaloniagara.org/ ISSA Buffalo Niagara]&lt;br /&gt;
&lt;br /&gt;
[http://www.wnysip.org/ WNYSIP - Western New York Society for Information Professionals ]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Review_Panel&amp;diff=13902</id>
		<title>OWASP Testing Guide v2 Review Panel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Review_Panel&amp;diff=13902"/>
				<updated>2006-12-01T18:07:40Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Table_of_Contents Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Update: 24th November, 23.00 (GMT+1)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
**********************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;Reviewing planning&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
**********************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The reviewers are:&lt;br /&gt;
Mark Roxberry,&lt;br /&gt;
Alberto Revelli,&lt;br /&gt;
Daniel Cuthbert,&lt;br /&gt;
Antonio Parata,&lt;br /&gt;
Matteo G.P. Flora,&lt;br /&gt;
Matteo Meucci,&lt;br /&gt;
Eoin Keary,&lt;br /&gt;
Stefano Di Paola,&lt;br /&gt;
James Kist,&lt;br /&gt;
Vicente Aguilera,&lt;br /&gt;
Mauro Bregolin,&lt;br /&gt;
Syed Mohamed A,&lt;br /&gt;
Paul Davies&lt;br /&gt;
&lt;br /&gt;
* II phase reviewing&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*********************************************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;Here is the complete list of articles to be reviewed: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*********************************************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Introduction --&amp;gt; reviewed by Eoin Keary'''&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''The OWASP Testing Framework --&amp;gt;...'''&lt;br /&gt;
1 of 1 article to be reviewed (Daniel doing this)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.1 Introduction and objectives --&amp;gt;.EK'''&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.2 Information Gathering (Reviewed by EK) --&amp;gt; Keary'''&lt;br /&gt;
9 of 10 articles reviewed -&amp;gt; &amp;lt;BR&amp;gt; &lt;br /&gt;
* '''Testing Web Application Fingerprint''' -added new article&lt;br /&gt;
** (Reviewed by JK) - Corrected the English in the &amp;quot;Brief Summary&amp;quot; section. Added &amp;quot;Description of the Issue&amp;quot;. In the Black-Box testing section, is it necessary to show all of the different web server versions? This information is just repeated from the referenced whitepaper. If we are going to do that, should we also include output from newer versions, such as IIS 6.0, Apache 1.3.37, Apache 2.x, etc.? &lt;br /&gt;
* '''Application Discovery''': &lt;br /&gt;
** Reviewed + updated(EK) (Maybe we should include HTTP methods for application descovery, such as HTTP HEAD command?)&amp;lt;BR&amp;gt;&lt;br /&gt;
** (Bregolin) If you are referring to things such as &amp;quot;fingerprinting&amp;quot;, it was hinted - and I personally agree on this - to create a new section on Web application fingerprinting. There's however a bit of overlap with Infrastructure configuration management testing&lt;br /&gt;
* '''Analysis of error codes''': &lt;br /&gt;
** Reviewed + updated(EK) &amp;lt;BR&amp;gt;&lt;br /&gt;
** Besides the own error, it would be necessary to speak about the voluntary provocation of errors? (Vicente). Two examples: &amp;lt;BR&amp;gt;&lt;br /&gt;
*** Example 1: Type error. (original): ?id=276 (test): ?id=X &amp;lt;BR&amp;gt;&lt;br /&gt;
*** Example 2: Type conversion error. (original): ?id=276 (test): ?id=276 and 1 in (select top 1 name from sysobjects) &amp;lt;BR&amp;gt;&lt;br /&gt;
** (Bregolin) Agree with the above. A testing methodology should be formalized, i.e. tester should verify if it is possible to cause information disclosure in error or diagnostic messages by tampering with user-alterable input using a set of techniques (such as type mismatch, overflow/underflow, excess input length, various forms of injection, ...)&lt;br /&gt;
* '''Infrastructure configuration management testing AoC''': &lt;br /&gt;
** Reviewed by EK. '''Not in typical guide structure -&amp;gt; (MM: I've changed the structure)'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''SSL/TLS Testing AoC''': &lt;br /&gt;
** Reviewed + updated(EK). '''(Reviewed by MM: changed the structure)'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''DB Listener Testing''': &lt;br /&gt;
** '''Incomplete'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''Application configuration management testing''': &lt;br /&gt;
** (Reviewed by JK). For Blackbox testing examples specific to IIS, refer to http://www.nextgenss.com/papers/iisrconfig.pdf. I think we should add an automated testing section, and reference tools such as Nikto, Wikto, and others.&lt;br /&gt;
** Reviewed by EK. '''Not typical guide structure -&amp;gt; (MM: I've changed the structure)'''&lt;br /&gt;
** This is generally a &amp;quot;white box&amp;quot; section. There are no examples of testing the configuration from a remote perspective. If this was the aim of the document, thats fine. '''- Need feedback on this one!!'''&lt;br /&gt;
** ''Sample/known files and directories'': might be good to refer to http://www.owasp.org/index.php/Old_file_testing_AoC ??&lt;br /&gt;
** ''Logging'': Timestamp is also important&lt;br /&gt;
* '''File extensions handling'''&amp;lt;BR&amp;gt;&lt;br /&gt;
** contains the text: &amp;quot;''...To review and expand...''&amp;quot; - '''Is this complete??'''&lt;br /&gt;
** '''Need a second opinion on this one...(MM yes it is complete)'''&lt;br /&gt;
* '''Old file testing''': Reviewed by EK&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.3 Business logic testing --&amp;gt; Meucci'''&lt;br /&gt;
1 of 1 article reviewed &lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.4 Authentication Testing --&amp;gt; Roxberry (articles have been edited)'''&lt;br /&gt;
0 of 7 articles to be reviewed &lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.4 Authentication Testing (95%) : Reviewed by MR, Paul Davies to push to 100%&lt;br /&gt;
** 4.4.1 Default or guessable (dictionary) user account (80%) : Reviewed by MR &lt;br /&gt;
** 4.4.2 Brute Force (95%) : Reviewed by MR&lt;br /&gt;
** 4.4.3 Bypassing authentication schema (95%) : Reviewed by MR &lt;br /&gt;
** 4.4.4 Directory traversal/file include (100%) : Reviewed by MR &lt;br /&gt;
** 4.4.5 Vulnerable remember password and pwd reset (90%) Reviewed by MR&lt;br /&gt;
** 4.4.6 Logout and Browser Cache Management Testing (100%) Reviewed by MR&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.5 Session Management Testing --&amp;gt; Syed Mohamed A'''&lt;br /&gt;
5 of 6 articles to be reviewed  &lt;br /&gt;
** 4.5 Session Management Testing (95%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.1 Analysis of the Session Management Schema (90%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.2 Cookie and Session token Manipulation (100%) (daniel reviewing)&lt;br /&gt;
** 4.5.3 Exposed session variables (90%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.4 Session Riding (XSRF) (80%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.5 HTTP Exploit (0%) (daniel reviewing)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.6 Data Validation Testing --&amp;gt; Meucci'''&lt;br /&gt;
18 articles reviewed (3 are at 0%)&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.6 Data Validation Testing : Reviewed by EK&lt;br /&gt;
*** (Bregolin) begin&lt;br /&gt;
*** [Note: Haven't committed the following since that would imply a substantial rewrite, let's see what others think]&lt;br /&gt;
*** I think that this section should first categorize what constitutes input for a web application. (Which allows to identify what must be tested, and how). i.e., obviously input fields, hidden fields, HTTP headers (such as Referer, cookies), HTTP methods etc.&lt;br /&gt;
*** There are other kinds of injection, such as CRLF injection.&lt;br /&gt;
*** SQL Injection affects SQL statements, and not queries (though usually that's the case)&lt;br /&gt;
*** It should be stressed that the main reason to perform data validation is to prevent application faults, i.e. unexpected behavior, that is violation of (security) requirements. Regardless of the categories of vulnerabilities listed, an application should (actually must!) verify all input against: type, length, range or domain validity. &amp;quot;Bad&amp;quot; input may not cause any of the listed vulnerabilities yet cause the application to misbehave, if it is not checked (possibly causing DoS or violating data integrity or confidentiality).&lt;br /&gt;
*** (Bregolin) end&lt;br /&gt;
** 4.6.1 Cross site scripting: Reviewed by EK (Reformatted it slightly with wiki tags). '''Not completed'''&lt;br /&gt;
*** Reviewed by SDP. Some thought about content structure: &lt;br /&gt;
***:As it is a testing guide, any other information about how to sanitize input should be referenced to Owasp Data Validation Project (no redundancy). Approach in testing section could be more schematic.&lt;br /&gt;
***:A kind of:&lt;br /&gt;
**** Special characters entities etc.&lt;br /&gt;
**** Context Dependent characters (an intro)&lt;br /&gt;
**** How to search for Reflected, stored and DOM vulnerabilities.&lt;br /&gt;
**** Non obvious injections (Administrative pages or non obvious pages) and second order injections (at least a small intro and/or a whitepaper/reference to incubated flaws).&lt;br /&gt;
** 4.6.1.1 HTTP Methods and XST Reviewed by MM. Reviewed by AP.&lt;br /&gt;
** 4.6.2 SQL Injection (90%-&amp;gt;100%) Reviewed by MM. Reviewed by EK.&lt;br /&gt;
*** Not sure about &amp;quot;inferential&amp;quot; injection definition in &amp;quot;Description of Issue&amp;quot;&lt;br /&gt;
*** Added some reference to Oracle. Corrected English.&lt;br /&gt;
** 4.6.2.1 Stored procedure injection (40%) '''TD (not enough informations)'''&lt;br /&gt;
**4.6.2.2 Oracle testing (0%) '''TD (not enough informations)'''&lt;br /&gt;
** 4.6.2.3 MySQL testing (100%) Reviewed by MM&lt;br /&gt;
** 4.6.2.4 SQL Server testing (95%) Reviewed by MM. Reviewed by AR.&lt;br /&gt;
** 4.6.3 LDAP Injection (90%) Reviewed by MM added wp and tools&lt;br /&gt;
** 4.6.4 ORM Injection (100%) '''TD (not enough informations)'''&lt;br /&gt;
** 4.6.5 XML Injection (90%) Reviwed and updated by MM. '''WP and tools?'''&lt;br /&gt;
** 4.6.6 SSI Injection (95%-&amp;gt;100%) Reviewed by MM &lt;br /&gt;
** 4.6.7 XPath Injection (80%) Reviewed by MM. '''Gray box section is to complete?'''&lt;br /&gt;
** 4.6.8 IMAP/SMTP Injection (95%-&amp;gt;100%)Reviewed by MM &lt;br /&gt;
** 4.6.9 Code Injection (70%) Reviewed by MM. '''Not completed'''&lt;br /&gt;
** 4.6.10 OS Commanding (70%) Reviewed by MM + added an example. '''Not completed'''&lt;br /&gt;
** 4.6.11 Buffer overflow Testing (100%) Reviewed by MM. '''Note: these tests are not usual web app tests'''&lt;br /&gt;
*** (Bregolin) The point is that these are not black box tests, so where they are now they are misplaced&lt;br /&gt;
** 4.6.11.1 Heap overflow (100%) Reviewed by MM&lt;br /&gt;
** 4.6.11.2 Stack overflow (100%)Reviewed by MM&lt;br /&gt;
** 4.6.11.3 Format string (100%)Reviewed by MM&lt;br /&gt;
** 4.6.12 Incubated vulnerability testing (95%) Reviewed by MM, whitepapers?&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''4.7 Denial of Service Testing--&amp;gt; Revelli'''&lt;br /&gt;
8 of 8 articles Reviewed&lt;br /&gt;
'''[OK] - To do the References'''&lt;br /&gt;
** 4.7 Denial of Service Testing 100% Reviewed by Revelli&lt;br /&gt;
** 4.7.1 Locking Customer Accounts 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.2 Buffer Overflows 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.3 User Specified Object Allocation 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.4 User Input as a Loop Counter 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.5 Writing User Provided Data to Disk 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.6 Failure to Release Resources 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.7 Storing too Much Data in Session 100% Reviewd by Revelli&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.8 Web Services Testing --&amp;gt; Matteo Meucci'''&lt;br /&gt;
6 of 6 articles reviewed&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.8 Web Services Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.1 XML Structural Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.2 XML content-level Testing (90%-&amp;gt;100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.3 HTTP GET parameters/REST Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.4 Naughty SOAP attachments (95%-&amp;gt;100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.5 Replay Testing (95%-&amp;gt;100%) Reviewed by Meucci. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.9 AJAX Testing --&amp;gt; Roxberry'''&lt;br /&gt;
3 of 3 articles to be reviewed &lt;br /&gt;
** 4.9 AJAX Testing (70%)&lt;br /&gt;
** 4.9.1 Vulnerabilities (60%)&lt;br /&gt;
** 4.9.2 How to test (60%)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''5. Writing Reports: value the real risk'''&lt;br /&gt;
We have to write about it. I consider it not yet finished.&lt;br /&gt;
O of 3 articles to be reviewed.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix A: Testing Tools --&amp;gt;Review and updated by Meucci'''&lt;br /&gt;
0 article of 1: need a paragraph to describe each OWASP tool&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix B: Suggested Reading --&amp;gt;...'''&lt;br /&gt;
1 article of 1: need to update it &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix C: Fuzz Vectors --&amp;gt; Stefano Di Paola, Subere '''&lt;br /&gt;
ok. Some other fuzz vectors could be added. &amp;lt;br&amp;gt;&lt;br /&gt;
How about every author to add his specific fuzz vector section?&amp;lt;br&amp;gt;&lt;br /&gt;
[Meucci] Good idea. I think that we have not to write a brief description of each fuzz vectors (this is an appendix).&lt;br /&gt;
Example: &lt;br /&gt;
 &lt;br /&gt;
LDAP Injection: &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*)(|%26&amp;lt;br&amp;gt;&lt;br /&gt;
... &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewers  Rules &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1) Check the english language&amp;lt;br&amp;gt;&lt;br /&gt;
2) Check the template: the articles on chapter 4 should have the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Template (http://www.owasp.org/index.php/Template_Paragraph_Testing_AoC)&lt;br /&gt;
&lt;br /&gt;
In some articles we don't need to talk about Gray Box Testing or other, so we can eliminate it.&lt;br /&gt;
&lt;br /&gt;
3) Check the reference style. (I'd like to have all the referenced URLs visible because I have to produce also a pdf document of the Guide).&lt;br /&gt;
I agree with Stefano, we have to use a reference like that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;== References ==&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'''Whitepapers'''&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* [1] Author1, Author2: &amp;quot;Title&amp;quot; - http://www.ietf.org/rfc/rfc2254.txt&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* [2]...&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'''Tools'''&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* Francois Larouche: &amp;quot;Multiple DBMS Sql Injection tool&amp;quot; - http://www.sqlpowerinjector.com/index.htm &amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4) Check the reference with the other articles of the guide or with the other OWASP Project.&lt;br /&gt;
&lt;br /&gt;
5) Other?&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Review_Panel&amp;diff=13899</id>
		<title>OWASP Testing Guide v2 Review Panel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Review_Panel&amp;diff=13899"/>
				<updated>2006-12-01T17:49:38Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Table_of_Contents Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Update: 24th November, 23.00 (GMT+1)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
**********************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;Reviewing planning&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
**********************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The reviewers are:&lt;br /&gt;
Mark Roxberry,&lt;br /&gt;
Alberto Revelli,&lt;br /&gt;
Daniel Cuthbert,&lt;br /&gt;
Antonio Parata,&lt;br /&gt;
Matteo G.P. Flora,&lt;br /&gt;
Matteo Meucci,&lt;br /&gt;
Eoin Keary,&lt;br /&gt;
Stefano Di Paola,&lt;br /&gt;
James Kist,&lt;br /&gt;
Vicente Aguilera,&lt;br /&gt;
Mauro Bregolin,&lt;br /&gt;
Syed Mohamed A,&lt;br /&gt;
Paul Davies&lt;br /&gt;
&lt;br /&gt;
* II phase reviewing&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*********************************************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;Here is the complete list of articles to be reviewed: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*********************************************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Introduction --&amp;gt; reviewed by Eoin Keary'''&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''The OWASP Testing Framework --&amp;gt;...'''&lt;br /&gt;
1 of 1 article to be reviewed (Daniel doing this)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.1 Introduction and objectives --&amp;gt;.EK'''&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.2 Information Gathering (Reviewed by EK) --&amp;gt; Keary'''&lt;br /&gt;
9 of 10 articles reviewed -&amp;gt; &amp;lt;BR&amp;gt; &lt;br /&gt;
* '''Testing Web Application Fingerprint''' -added new article&lt;br /&gt;
** (Reviewed by JK) - Corrected the English in the &amp;quot;Brief Summary&amp;quot; section. Added &amp;quot;Description of the Issue&amp;quot;. In the Black-Box testing section, is it necessary to show all of the different web server versions? This information is just repeated from the referenced whitepaper. If we are going to do that, should we also include output from newer versions, such as IIS 6.0, Apache 1.3.37, Apache 2.x, etc.? &lt;br /&gt;
* '''Application Discovery''': &lt;br /&gt;
** Reviewed + updated(EK) (Maybe we should include HTTP methods for application descovery, such as HTTP HEAD command?)&amp;lt;BR&amp;gt;&lt;br /&gt;
** (Bregolin) If you are referring to things such as &amp;quot;fingerprinting&amp;quot;, it was hinted - and I personally agree on this - to create a new section on Web application fingerprinting. There's however a bit of overlap with Infrastructure configuration management testing&lt;br /&gt;
* '''Analysis of error codes''': &lt;br /&gt;
** Reviewed + updated(EK) &amp;lt;BR&amp;gt;&lt;br /&gt;
** Besides the own error, it would be necessary to speak about the voluntary provocation of errors? (Vicente). Two examples: &amp;lt;BR&amp;gt;&lt;br /&gt;
*** Example 1: Type error. (original): ?id=276 (test): ?id=X &amp;lt;BR&amp;gt;&lt;br /&gt;
*** Example 2: Type conversion error. (original): ?id=276 (test): ?id=276 and 1 in (select top 1 name from sysobjects) &amp;lt;BR&amp;gt;&lt;br /&gt;
** (Bregolin) Agree with the above. A testing methodology should be formalized, i.e. tester should verify if it is possible to cause information disclosure in error or diagnostic messages by tampering with user-alterable input using a set of techniques (such as type mismatch, overflow/underflow, excess input length, various forms of injection, ...)&lt;br /&gt;
* '''Infrastructure configuration management testing AoC''': &lt;br /&gt;
** Reviewed by EK. '''Not in typical guide structure -&amp;gt; (MM: I've changed the structure)'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''SSL/TLS Testing AoC''': &lt;br /&gt;
** Reviewed + updated(EK). '''(Reviewed by MM: changed the structure)'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''DB Listener Testing''': &lt;br /&gt;
** '''Incomplete'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''Application configuration management testing''': &lt;br /&gt;
** Reviewed by EK. '''Not typical guide structure -&amp;gt; (MM: I've changed the structure)'''&lt;br /&gt;
** This is generally a &amp;quot;white box&amp;quot; section. There are no examples of testing the configuration from a remote perspective. If this was the aim of the document, thats fine. '''- Need feedback on this one!!'''&lt;br /&gt;
** ''Sample/known files and directories'': might be good to refer to http://www.owasp.org/index.php/Old_file_testing_AoC ??&lt;br /&gt;
** ''Logging'': Timestamp is also important&lt;br /&gt;
* '''File extensions handling'''&amp;lt;BR&amp;gt;&lt;br /&gt;
** contains the text: &amp;quot;''...To review and expand...''&amp;quot; - '''Is this complete??'''&lt;br /&gt;
** '''Need a second opinion on this one...(MM yes it is complete)'''&lt;br /&gt;
* '''Old file testing''': Reviewed by EK&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.3 Business logic testing --&amp;gt; Meucci'''&lt;br /&gt;
1 of 1 article reviewed &lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.4 Authentication Testing --&amp;gt; Roxberry (articles have been edited)'''&lt;br /&gt;
0 of 7 articles to be reviewed &lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.4 Authentication Testing (95%) : Reviewed by MR, Paul Davies to push to 100%&lt;br /&gt;
** 4.4.1 Default or guessable (dictionary) user account (80%) : Reviewed by MR &lt;br /&gt;
** 4.4.2 Brute Force (95%) : Reviewed by MR&lt;br /&gt;
** 4.4.3 Bypassing authentication schema (95%) : Reviewed by MR &lt;br /&gt;
** 4.4.4 Directory traversal/file include (100%) : Reviewed by MR &lt;br /&gt;
** 4.4.5 Vulnerable remember password and pwd reset (90%) Reviewed by MR&lt;br /&gt;
** 4.4.6 Logout and Browser Cache Management Testing (100%) Reviewed by MR&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.5 Session Management Testing --&amp;gt; Syed Mohamed A'''&lt;br /&gt;
5 of 6 articles to be reviewed  &lt;br /&gt;
** 4.5 Session Management Testing (95%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.1 Analysis of the Session Management Schema (90%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.2 Cookie and Session token Manipulation (100%) (daniel reviewing)&lt;br /&gt;
** 4.5.3 Exposed session variables (90%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.4 Session Riding (XSRF) (80%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.5 HTTP Exploit (0%) (daniel reviewing)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.6 Data Validation Testing --&amp;gt; Meucci'''&lt;br /&gt;
18 articles reviewed (3 are at 0%)&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.6 Data Validation Testing : Reviewed by EK&lt;br /&gt;
*** (Bregolin) begin&lt;br /&gt;
*** [Note: Haven't committed the following since that would imply a substantial rewrite, let's see what others think]&lt;br /&gt;
*** I think that this section should first categorize what constitutes input for a web application. (Which allows to identify what must be tested, and how). i.e., obviously input fields, hidden fields, HTTP headers (such as Referer, cookies), HTTP methods etc.&lt;br /&gt;
*** There are other kinds of injection, such as CRLF injection.&lt;br /&gt;
*** SQL Injection affects SQL statements, and not queries (though usually that's the case)&lt;br /&gt;
*** It should be stressed that the main reason to perform data validation is to prevent application faults, i.e. unexpected behavior, that is violation of (security) requirements. Regardless of the categories of vulnerabilities listed, an application should (actually must!) verify all input against: type, length, range or domain validity. &amp;quot;Bad&amp;quot; input may not cause any of the listed vulnerabilities yet cause the application to misbehave, if it is not checked (possibly causing DoS or violating data integrity or confidentiality).&lt;br /&gt;
*** (Bregolin) end&lt;br /&gt;
** 4.6.1 Cross site scripting: Reviewed by EK (Reformatted it slightly with wiki tags). '''Not completed'''&lt;br /&gt;
*** Reviewed by SDP. Some thought about content structure: &lt;br /&gt;
***:As it is a testing guide, any other information about how to sanitize input should be referenced to Owasp Data Validation Project (no redundancy). Approach in testing section could be more schematic.&lt;br /&gt;
***:A kind of:&lt;br /&gt;
**** Special characters entities etc.&lt;br /&gt;
**** Context Dependent characters (an intro)&lt;br /&gt;
**** How to search for Reflected, stored and DOM vulnerabilities.&lt;br /&gt;
**** Non obvious injections (Administrative pages or non obvious pages) and second order injections (at least a small intro and/or a whitepaper/reference to incubated flaws).&lt;br /&gt;
** 4.6.1.1 HTTP Methods and XST Reviewed by MM. Reviewed by AP.&lt;br /&gt;
** 4.6.2 SQL Injection (90%-&amp;gt;100%) Reviewed by MM. Reviewed by EK.&lt;br /&gt;
*** Not sure about &amp;quot;inferential&amp;quot; injection definition in &amp;quot;Description of Issue&amp;quot;&lt;br /&gt;
*** Added some reference to Oracle. Corrected English.&lt;br /&gt;
** 4.6.2.1 Stored procedure injection (40%) '''TD (not enough informations)'''&lt;br /&gt;
**4.6.2.2 Oracle testing (0%) '''TD (not enough informations)'''&lt;br /&gt;
** 4.6.2.3 MySQL testing (100%) Reviewed by MM&lt;br /&gt;
** 4.6.2.4 SQL Server testing (95%) Reviewed by MM. Reviewed by AR.&lt;br /&gt;
** 4.6.3 LDAP Injection (90%) Reviewed by MM added wp and tools&lt;br /&gt;
** 4.6.4 ORM Injection (100%) '''TD (not enough informations)'''&lt;br /&gt;
** 4.6.5 XML Injection (90%) Reviwed and updated by MM. '''WP and tools?'''&lt;br /&gt;
** 4.6.6 SSI Injection (95%-&amp;gt;100%) Reviewed by MM &lt;br /&gt;
** 4.6.7 XPath Injection (80%) Reviewed by MM. '''Gray box section is to complete?'''&lt;br /&gt;
** 4.6.8 IMAP/SMTP Injection (95%-&amp;gt;100%)Reviewed by MM &lt;br /&gt;
** 4.6.9 Code Injection (70%) Reviewed by MM. '''Not completed'''&lt;br /&gt;
** 4.6.10 OS Commanding (70%) Reviewed by MM + added an example. '''Not completed'''&lt;br /&gt;
** 4.6.11 Buffer overflow Testing (100%) Reviewed by MM. '''Note: these tests are not usual web app tests'''&lt;br /&gt;
*** (Bregolin) The point is that these are not black box tests, so where they are now they are misplaced&lt;br /&gt;
** 4.6.11.1 Heap overflow (100%) Reviewed by MM&lt;br /&gt;
** 4.6.11.2 Stack overflow (100%)Reviewed by MM&lt;br /&gt;
** 4.6.11.3 Format string (100%)Reviewed by MM&lt;br /&gt;
** 4.6.12 Incubated vulnerability testing (95%) Reviewed by MM, whitepapers?&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''4.7 Denial of Service Testing--&amp;gt; Revelli'''&lt;br /&gt;
8 of 8 articles Reviewed&lt;br /&gt;
'''[OK] - To do the References'''&lt;br /&gt;
** 4.7 Denial of Service Testing 100% Reviewed by Revelli&lt;br /&gt;
** 4.7.1 Locking Customer Accounts 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.2 Buffer Overflows 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.3 User Specified Object Allocation 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.4 User Input as a Loop Counter 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.5 Writing User Provided Data to Disk 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.6 Failure to Release Resources 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.7 Storing too Much Data in Session 100% Reviewd by Revelli&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.8 Web Services Testing --&amp;gt; Matteo Meucci'''&lt;br /&gt;
6 of 6 articles reviewed&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.8 Web Services Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.1 XML Structural Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.2 XML content-level Testing (90%-&amp;gt;100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.3 HTTP GET parameters/REST Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.4 Naughty SOAP attachments (95%-&amp;gt;100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.5 Replay Testing (95%-&amp;gt;100%) Reviewed by Meucci. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.9 AJAX Testing --&amp;gt; Roxberry'''&lt;br /&gt;
3 of 3 articles to be reviewed &lt;br /&gt;
** 4.9 AJAX Testing (70%)&lt;br /&gt;
** 4.9.1 Vulnerabilities (60%)&lt;br /&gt;
** 4.9.2 How to test (60%)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''5. Writing Reports: value the real risk'''&lt;br /&gt;
We have to write about it. I consider it not yet finished.&lt;br /&gt;
O of 3 articles to be reviewed.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix A: Testing Tools --&amp;gt;Review and updated by Meucci'''&lt;br /&gt;
0 article of 1: need a paragraph to describe each OWASP tool&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix B: Suggested Reading --&amp;gt;...'''&lt;br /&gt;
1 article of 1: need to update it &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix C: Fuzz Vectors --&amp;gt; Stefano Di Paola, Subere '''&lt;br /&gt;
ok. Some other fuzz vectors could be added. &amp;lt;br&amp;gt;&lt;br /&gt;
How about every author to add his specific fuzz vector section?&amp;lt;br&amp;gt;&lt;br /&gt;
[Meucci] Good idea. I think that we have not to write a brief description of each fuzz vectors (this is an appendix).&lt;br /&gt;
Example: &lt;br /&gt;
 &lt;br /&gt;
LDAP Injection: &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*)(|%26&amp;lt;br&amp;gt;&lt;br /&gt;
... &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewers  Rules &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1) Check the english language&amp;lt;br&amp;gt;&lt;br /&gt;
2) Check the template: the articles on chapter 4 should have the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Template (http://www.owasp.org/index.php/Template_Paragraph_Testing_AoC)&lt;br /&gt;
&lt;br /&gt;
In some articles we don't need to talk about Gray Box Testing or other, so we can eliminate it.&lt;br /&gt;
&lt;br /&gt;
3) Check the reference style. (I'd like to have all the referenced URLs visible because I have to produce also a pdf document of the Guide).&lt;br /&gt;
I agree with Stefano, we have to use a reference like that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;== References ==&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'''Whitepapers'''&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* [1] Author1, Author2: &amp;quot;Title&amp;quot; - http://www.ietf.org/rfc/rfc2254.txt&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* [2]...&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'''Tools'''&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* Francois Larouche: &amp;quot;Multiple DBMS Sql Injection tool&amp;quot; - http://www.sqlpowerinjector.com/index.htm &amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4) Check the reference with the other articles of the guide or with the other OWASP Project.&lt;br /&gt;
&lt;br /&gt;
5) Other?&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Review_Panel&amp;diff=13898</id>
		<title>OWASP Testing Guide v2 Review Panel</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Testing_Guide_v2_Review_Panel&amp;diff=13898"/>
				<updated>2006-12-01T17:45:32Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/OWASP_Testing_Guide_v2_Table_of_Contents Table of Contents]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Update: 24th November, 23.00 (GMT+1)&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
**********************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;Reviewing planning&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
**********************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
The reviewers are:&lt;br /&gt;
Mark Roxberry,&lt;br /&gt;
Alberto Revelli,&lt;br /&gt;
Daniel Cuthbert,&lt;br /&gt;
Antonio Parata,&lt;br /&gt;
Matteo G.P. Flora,&lt;br /&gt;
Matteo Meucci,&lt;br /&gt;
Eoin Keary,&lt;br /&gt;
Stefano Di Paola,&lt;br /&gt;
James Kist,&lt;br /&gt;
Vicente Aguilera,&lt;br /&gt;
Mauro Bregolin,&lt;br /&gt;
Syed Mohamed A,&lt;br /&gt;
Paul Davies&lt;br /&gt;
&lt;br /&gt;
* II phase reviewing&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*********************************************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;Here is the complete list of articles to be reviewed: &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*********************************************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Introduction --&amp;gt; reviewed by Eoin Keary'''&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''The OWASP Testing Framework --&amp;gt;...'''&lt;br /&gt;
1 of 1 article to be reviewed (Daniel doing this)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.1 Introduction and objectives --&amp;gt;.EK'''&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.2 Information Gathering (Reviewed by EK) --&amp;gt; Keary'''&lt;br /&gt;
9 of 10 articles reviewed -&amp;gt; &amp;lt;BR&amp;gt; &lt;br /&gt;
* '''Testing Web Application Fingerprint''' -added new article&lt;br /&gt;
(Reviewed by JK) - Corrected the English in the &amp;quot;Brief Summary&amp;quot; section. Added &amp;quot;Description of the Issue&amp;quot;. In the Black-Box testing section, is it necessary to show all of the different web server versions? This information is just repeated from the referenced whitepaper. If we are going to do that, should we also include output from newer versions, such as IIS 6.0, Apache 1.3.37, Apache 2.x, etc.? &lt;br /&gt;
* '''Application Discovery''': &lt;br /&gt;
** Reviewed + updated(EK) (Maybe we should include HTTP methods for application descovery, such as HTTP HEAD command?)&amp;lt;BR&amp;gt;&lt;br /&gt;
** (Bregolin) If you are referring to things such as &amp;quot;fingerprinting&amp;quot;, it was hinted - and I personally agree on this - to create a new section on Web application fingerprinting. There's however a bit of overlap with Infrastructure configuration management testing&lt;br /&gt;
* '''Analysis of error codes''': &lt;br /&gt;
** Reviewed + updated(EK) &amp;lt;BR&amp;gt;&lt;br /&gt;
** Besides the own error, it would be necessary to speak about the voluntary provocation of errors? (Vicente). Two examples: &amp;lt;BR&amp;gt;&lt;br /&gt;
*** Example 1: Type error. (original): ?id=276 (test): ?id=X &amp;lt;BR&amp;gt;&lt;br /&gt;
*** Example 2: Type conversion error. (original): ?id=276 (test): ?id=276 and 1 in (select top 1 name from sysobjects) &amp;lt;BR&amp;gt;&lt;br /&gt;
** (Bregolin) Agree with the above. A testing methodology should be formalized, i.e. tester should verify if it is possible to cause information disclosure in error or diagnostic messages by tampering with user-alterable input using a set of techniques (such as type mismatch, overflow/underflow, excess input length, various forms of injection, ...)&lt;br /&gt;
* '''Infrastructure configuration management testing AoC''': &lt;br /&gt;
** Reviewed by EK. '''Not in typical guide structure -&amp;gt; (MM: I've changed the structure)'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''SSL/TLS Testing AoC''': &lt;br /&gt;
** Reviewed + updated(EK). '''(Reviewed by MM: changed the structure)'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''DB Listener Testing''': &lt;br /&gt;
** '''Incomplete'''&amp;lt;BR&amp;gt;&lt;br /&gt;
* '''Application configuration management testing''': &lt;br /&gt;
** Reviewed by EK. '''Not typical guide structure -&amp;gt; (MM: I've changed the structure)'''&lt;br /&gt;
** This is generally a &amp;quot;white box&amp;quot; section. There are no examples of testing the configuration from a remote perspective. If this was the aim of the document, thats fine. '''- Need feedback on this one!!'''&lt;br /&gt;
** ''Sample/known files and directories'': might be good to refer to http://www.owasp.org/index.php/Old_file_testing_AoC ??&lt;br /&gt;
** ''Logging'': Timestamp is also important&lt;br /&gt;
* '''File extensions handling'''&amp;lt;BR&amp;gt;&lt;br /&gt;
** contains the text: &amp;quot;''...To review and expand...''&amp;quot; - '''Is this complete??'''&lt;br /&gt;
** '''Need a second opinion on this one...(MM yes it is complete)'''&lt;br /&gt;
* '''Old file testing''': Reviewed by EK&lt;br /&gt;
&amp;lt;BR&amp;gt;&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.3 Business logic testing --&amp;gt; Meucci'''&lt;br /&gt;
1 of 1 article reviewed &lt;br /&gt;
'''[OK]'''&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.4 Authentication Testing --&amp;gt; Roxberry (articles have been edited)'''&lt;br /&gt;
0 of 7 articles to be reviewed &lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.4 Authentication Testing (95%) : Reviewed by MR, Paul Davies to push to 100%&lt;br /&gt;
** 4.4.1 Default or guessable (dictionary) user account (80%) : Reviewed by MR &lt;br /&gt;
** 4.4.2 Brute Force (95%) : Reviewed by MR&lt;br /&gt;
** 4.4.3 Bypassing authentication schema (95%) : Reviewed by MR &lt;br /&gt;
** 4.4.4 Directory traversal/file include (100%) : Reviewed by MR &lt;br /&gt;
** 4.4.5 Vulnerable remember password and pwd reset (90%) Reviewed by MR&lt;br /&gt;
** 4.4.6 Logout and Browser Cache Management Testing (100%) Reviewed by MR&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.5 Session Management Testing --&amp;gt; Syed Mohamed A'''&lt;br /&gt;
5 of 6 articles to be reviewed  &lt;br /&gt;
** 4.5 Session Management Testing (95%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.1 Analysis of the Session Management Schema (90%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.2 Cookie and Session token Manipulation (100%) (daniel reviewing)&lt;br /&gt;
** 4.5.3 Exposed session variables (90%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.4 Session Riding (XSRF) (80%-&amp;gt;100%) (daniel reviewing)&lt;br /&gt;
** 4.5.5 HTTP Exploit (0%) (daniel reviewing)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.6 Data Validation Testing --&amp;gt; Meucci'''&lt;br /&gt;
18 articles reviewed (3 are at 0%)&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.6 Data Validation Testing : Reviewed by EK&lt;br /&gt;
*** (Bregolin) begin&lt;br /&gt;
*** [Note: Haven't committed the following since that would imply a substantial rewrite, let's see what others think]&lt;br /&gt;
*** I think that this section should first categorize what constitutes input for a web application. (Which allows to identify what must be tested, and how). i.e., obviously input fields, hidden fields, HTTP headers (such as Referer, cookies), HTTP methods etc.&lt;br /&gt;
*** There are other kinds of injection, such as CRLF injection.&lt;br /&gt;
*** SQL Injection affects SQL statements, and not queries (though usually that's the case)&lt;br /&gt;
*** It should be stressed that the main reason to perform data validation is to prevent application faults, i.e. unexpected behavior, that is violation of (security) requirements. Regardless of the categories of vulnerabilities listed, an application should (actually must!) verify all input against: type, length, range or domain validity. &amp;quot;Bad&amp;quot; input may not cause any of the listed vulnerabilities yet cause the application to misbehave, if it is not checked (possibly causing DoS or violating data integrity or confidentiality).&lt;br /&gt;
*** (Bregolin) end&lt;br /&gt;
** 4.6.1 Cross site scripting: Reviewed by EK (Reformatted it slightly with wiki tags). '''Not completed'''&lt;br /&gt;
*** Reviewed by SDP. Some thought about content structure: &lt;br /&gt;
***:As it is a testing guide, any other information about how to sanitize input should be referenced to Owasp Data Validation Project (no redundancy). Approach in testing section could be more schematic.&lt;br /&gt;
***:A kind of:&lt;br /&gt;
**** Special characters entities etc.&lt;br /&gt;
**** Context Dependent characters (an intro)&lt;br /&gt;
**** How to search for Reflected, stored and DOM vulnerabilities.&lt;br /&gt;
**** Non obvious injections (Administrative pages or non obvious pages) and second order injections (at least a small intro and/or a whitepaper/reference to incubated flaws).&lt;br /&gt;
** 4.6.1.1 HTTP Methods and XST Reviewed by MM. Reviewed by AP.&lt;br /&gt;
** 4.6.2 SQL Injection (90%-&amp;gt;100%) Reviewed by MM. Reviewed by EK.&lt;br /&gt;
*** Not sure about &amp;quot;inferential&amp;quot; injection definition in &amp;quot;Description of Issue&amp;quot;&lt;br /&gt;
*** Added some reference to Oracle. Corrected English.&lt;br /&gt;
** 4.6.2.1 Stored procedure injection (40%) '''TD (not enough informations)'''&lt;br /&gt;
**4.6.2.2 Oracle testing (0%) '''TD (not enough informations)'''&lt;br /&gt;
** 4.6.2.3 MySQL testing (100%) Reviewed by MM&lt;br /&gt;
** 4.6.2.4 SQL Server testing (95%) Reviewed by MM. Reviewed by AR.&lt;br /&gt;
** 4.6.3 LDAP Injection (90%) Reviewed by MM added wp and tools&lt;br /&gt;
** 4.6.4 ORM Injection (100%) '''TD (not enough informations)'''&lt;br /&gt;
** 4.6.5 XML Injection (90%) Reviwed and updated by MM. '''WP and tools?'''&lt;br /&gt;
** 4.6.6 SSI Injection (95%-&amp;gt;100%) Reviewed by MM &lt;br /&gt;
** 4.6.7 XPath Injection (80%) Reviewed by MM. '''Gray box section is to complete?'''&lt;br /&gt;
** 4.6.8 IMAP/SMTP Injection (95%-&amp;gt;100%)Reviewed by MM &lt;br /&gt;
** 4.6.9 Code Injection (70%) Reviewed by MM. '''Not completed'''&lt;br /&gt;
** 4.6.10 OS Commanding (70%) Reviewed by MM + added an example. '''Not completed'''&lt;br /&gt;
** 4.6.11 Buffer overflow Testing (100%) Reviewed by MM. '''Note: these tests are not usual web app tests'''&lt;br /&gt;
*** (Bregolin) The point is that these are not black box tests, so where they are now they are misplaced&lt;br /&gt;
** 4.6.11.1 Heap overflow (100%) Reviewed by MM&lt;br /&gt;
** 4.6.11.2 Stack overflow (100%)Reviewed by MM&lt;br /&gt;
** 4.6.11.3 Format string (100%)Reviewed by MM&lt;br /&gt;
** 4.6.12 Incubated vulnerability testing (95%) Reviewed by MM, whitepapers?&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
* '''4.7 Denial of Service Testing--&amp;gt; Revelli'''&lt;br /&gt;
8 of 8 articles Reviewed&lt;br /&gt;
'''[OK] - To do the References'''&lt;br /&gt;
** 4.7 Denial of Service Testing 100% Reviewed by Revelli&lt;br /&gt;
** 4.7.1 Locking Customer Accounts 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.2 Buffer Overflows 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.3 User Specified Object Allocation 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.4 User Input as a Loop Counter 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.5 Writing User Provided Data to Disk 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.6 Failure to Release Resources 100% Reviewd by Revelli&lt;br /&gt;
** 4.7.7 Storing too Much Data in Session 100% Reviewd by Revelli&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.8 Web Services Testing --&amp;gt; Matteo Meucci'''&lt;br /&gt;
6 of 6 articles reviewed&lt;br /&gt;
'''[OK]'''&lt;br /&gt;
** 4.8 Web Services Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.1 XML Structural Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.2 XML content-level Testing (90%-&amp;gt;100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.3 HTTP GET parameters/REST Testing (100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.4 Naughty SOAP attachments (95%-&amp;gt;100%) Reviewed by Meucci&lt;br /&gt;
** 4.8.5 Replay Testing (95%-&amp;gt;100%) Reviewed by Meucci. &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''4.9 AJAX Testing --&amp;gt; Roxberry'''&lt;br /&gt;
3 of 3 articles to be reviewed &lt;br /&gt;
** 4.9 AJAX Testing (70%)&lt;br /&gt;
** 4.9.1 Vulnerabilities (60%)&lt;br /&gt;
** 4.9.2 How to test (60%)&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''5. Writing Reports: value the real risk'''&lt;br /&gt;
We have to write about it. I consider it not yet finished.&lt;br /&gt;
O of 3 articles to be reviewed.&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix A: Testing Tools --&amp;gt;Review and updated by Meucci'''&lt;br /&gt;
0 article of 1: need a paragraph to describe each OWASP tool&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix B: Suggested Reading --&amp;gt;...'''&lt;br /&gt;
1 article of 1: need to update it &lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
* '''Appendix C: Fuzz Vectors --&amp;gt; Stefano Di Paola, Subere '''&lt;br /&gt;
ok. Some other fuzz vectors could be added. &amp;lt;br&amp;gt;&lt;br /&gt;
How about every author to add his specific fuzz vector section?&amp;lt;br&amp;gt;&lt;br /&gt;
[Meucci] Good idea. I think that we have not to write a brief description of each fuzz vectors (this is an appendix).&lt;br /&gt;
Example: &lt;br /&gt;
 &lt;br /&gt;
LDAP Injection: &amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;*)(|%26&amp;lt;br&amp;gt;&lt;br /&gt;
... &amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
Reviewers  Rules &amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;nowiki&amp;gt;&lt;br /&gt;
*************************&lt;br /&gt;
&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
1) Check the english language&amp;lt;br&amp;gt;&lt;br /&gt;
2) Check the template: the articles on chapter 4 should have the following:&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
* Template (http://www.owasp.org/index.php/Template_Paragraph_Testing_AoC)&lt;br /&gt;
&lt;br /&gt;
In some articles we don't need to talk about Gray Box Testing or other, so we can eliminate it.&lt;br /&gt;
&lt;br /&gt;
3) Check the reference style. (I'd like to have all the referenced URLs visible because I have to produce also a pdf document of the Guide).&lt;br /&gt;
I agree with Stefano, we have to use a reference like that:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;== References ==&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'''Whitepapers'''&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* [1] Author1, Author2: &amp;quot;Title&amp;quot; - http://www.ietf.org/rfc/rfc2254.txt&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* [2]...&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;'''Tools'''&amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;nowiki&amp;gt;* Francois Larouche: &amp;quot;Multiple DBMS Sql Injection tool&amp;quot; - http://www.sqlpowerinjector.com/index.htm &amp;lt;br&amp;gt;&amp;lt;/nowiki&amp;gt;&lt;br /&gt;
&lt;br /&gt;
4) Check the reference with the other articles of the guide or with the other OWASP Project.&lt;br /&gt;
&lt;br /&gt;
5) Other?&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Web_Application_Fingerprint_(OWASP-IG-004)&amp;diff=13897</id>
		<title>Testing for Web Application Fingerprint (OWASP-IG-004)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Web_Application_Fingerprint_(OWASP-IG-004)&amp;diff=13897"/>
				<updated>2006-12-01T17:41:24Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
Web server fingerprinting is a critical task for the Penetration tester. Knowing the version and type of a running web server allows testers to determine known vulnerabilities and the appropriate exploits to use during testing.&lt;br /&gt;
&lt;br /&gt;
== Description of the Issue ==&lt;br /&gt;
There are several different vendors and versions of web servers on the market today. Knowing the type of web server that you are testing significantly helps in the testing process, and will also change the course of the test. This information can be derived by sending the web server specific commands and analyzing the output, as each version of web server software may respond differently to these commands. By knowing how each type of web server responds to specific commands and keeping this information in a web server fingerprint database, a penetration tester can send these commands to the web server, analyze the respsonse, and compare it to the database of known signatures. Please note that it usually takes several different commands to accurately identify the web server, as  sometimes different versions react similarly to the same command. Rarely, however, do different versions react the same to all HTTP commands. So, by sending several different commands, you increase the accuracy of your guess.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
The simplest and most basic form of identifying a Web server is to look at the Server field in the HTTP response header. For our experiments we use netcat. &lt;br /&gt;
Consider the following HTTP Request-Response: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc 202.41.76.251 80&lt;br /&gt;
HEAD / HTTP/1.0&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Date: Mon, 16 Jun 2003 02:53:29 GMT&lt;br /&gt;
Server: Apache/1.3.3 (Unix)  (Red Hat/Linux)&lt;br /&gt;
Last-Modified: Wed, 07 Oct 1998 11:18:14 GMT&lt;br /&gt;
ETag: &amp;quot;1813-49b-361b4df6&amp;quot;&lt;br /&gt;
Accept-Ranges: bytes&lt;br /&gt;
Content-Length: 1179&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: text/html&lt;br /&gt;
&lt;br /&gt;
$&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
from the ''Server'' field we understand that the server is Apache, version 1.3.3, running on Linux operating system.&lt;br /&gt;
Three examples of the HTTP response headers are shown below:&lt;br /&gt;
&lt;br /&gt;
From an '''Apache 1.3.23''' server: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Date: Sun, 15 Jun 2003 17:10: 49 GMT &lt;br /&gt;
Server: Apache/1.3.23 &lt;br /&gt;
Last-Modified: Thu, 27 Feb 2003 03:48: 19 GMT &lt;br /&gt;
ETag: 32417-c4-3e5d8a83 &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Content-Length: 196 &lt;br /&gt;
Connection: close &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
From a '''Microsoft IIS 5.0''' server:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Server: Microsoft-IIS/5.0 &lt;br /&gt;
Expires: Yours, 17 Jun 2003 01:41: 33 GMT &lt;br /&gt;
Date: Mon, 16 Jun 2003 01:41: 33 GMT &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Last-Modified: Wed, 28 May 2003 15:32: 21 GMT &lt;br /&gt;
ETag: b0aac0542e25c31: 89d &lt;br /&gt;
Content-Length: 7369 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
From a '''Netscape Enterprise 4.1''' server: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Server: Netscape-Enterprise/4.1 &lt;br /&gt;
Date: Mon, 16 Jun 2003 06:19: 04 GMT &lt;br /&gt;
Content-type: text/HTML &lt;br /&gt;
Last-modified: Wed, 31 Jul 2002 15:37: 56 GMT &lt;br /&gt;
Content-length: 57 &lt;br /&gt;
Accept-ranges: bytes &lt;br /&gt;
Connection: close &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
This testing methodology however is not so good. There are several techniques that allow to obfuscate or to modify the server banner string.&lt;br /&gt;
For example we could obtain the following answer:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
403 HTTP/1.1 &lt;br /&gt;
Forbidden Date: Mon, 16 Jun 2003 02:41: 27 GMT &lt;br /&gt;
Server: Unknown-Webserver/1.0 &lt;br /&gt;
Connection: close &lt;br /&gt;
Content-Type: text/HTML; &lt;br /&gt;
charset=iso-8859-1 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In this case the server field of that response is obfuscated: we cannot know what type of web server is running.&lt;br /&gt;
&lt;br /&gt;
== Protocol behaviour == &lt;br /&gt;
Refined techniques of testing take in consideration various characteristics of the several web servers available on the market. We will list some methodologies that allow us to deduce the type of web server in use.&lt;br /&gt;
&lt;br /&gt;
=== HTTP header field ordering === &lt;br /&gt;
The first method consists in observing the ordering of the several headers in the response. Every web server has just an inner ordering of the header. We consider the following answers as an example:&lt;br /&gt;
&lt;br /&gt;
Response from '''Apache 1.3.23''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc apache.example.com 80 &lt;br /&gt;
HEAD / HTTP/1.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Date: Sun, 15 Jun 2003 17:10: 49 GMT &lt;br /&gt;
Server: Apache/1.3.23 &lt;br /&gt;
Last-Modified: Thu, 27 Feb 2003 03:48: 19 GMT &lt;br /&gt;
ETag: 32417-c4-3e5d8a83 &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Content-Length: 196 &lt;br /&gt;
Connection: close &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''IIS 5.0''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc iis.example.com 80 &lt;br /&gt;
HEAD / HTTP/1.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Server: Microsoft-IIS/5.0 &lt;br /&gt;
Content-Location: http://iis.example.com/Default.htm &lt;br /&gt;
Date: Fri, 01 Jan 1999 20:13: 52 GMT &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Last-Modified: Fri, 01 Jan 1999 20:13: 52 GMT &lt;br /&gt;
ETag: W/e0d362a4c335be1: ae1 &lt;br /&gt;
Content-Length: 133 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''Netscape Enterprise 4.1''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc netscape.example.com 80 &lt;br /&gt;
HEAD / HTTP/1.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Server: Netscape-Enterprise/4.1 &lt;br /&gt;
Date: Mon, 16 Jun 2003 06:01: 40 GMT &lt;br /&gt;
Content-type: text/HTML &lt;br /&gt;
Last-modified: Wed, 31 Jul 2002 15:37: 56 GMT &lt;br /&gt;
Content-length: 57 &lt;br /&gt;
Accept-ranges: bytes &lt;br /&gt;
Connection: close &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
We can notice that the ordering of the ''Date'' field and the ''Server'' field differs between Apache, Netscape Enterprise and IIS.&lt;br /&gt;
&lt;br /&gt;
=== Malformed requests test === &lt;br /&gt;
Another useful test to execute consists in sending  malformed requests to the server, or requests of nonexistent pages.&lt;br /&gt;
We consider the following HTTP response: &lt;br /&gt;
&lt;br /&gt;
Response from '''Apache 1.3.23'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc apache.example.com 80 &lt;br /&gt;
GET / HTTP/3.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 400 Bad Request &lt;br /&gt;
Date: Sun, 15 Jun 2003 17:12: 37 GMT &lt;br /&gt;
Server: Apache/1.3.23 &lt;br /&gt;
Connection: close &lt;br /&gt;
Transfer: chunked &lt;br /&gt;
Content-Type: text/HTML; charset=iso-8859-1 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''IIS 5.0''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc iis.example.com 80 &lt;br /&gt;
GET / HTTP/3.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Server: Microsoft-IIS/5.0 &lt;br /&gt;
Content-Location: http://iis.example.com/Default.htm &lt;br /&gt;
Date: Fri, 01 Jan 1999 20:14: 02 GMT &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Last-Modified: Fri, 01 Jan 1999 20:14: 02 GMT &lt;br /&gt;
ETag: W/e0d362a4c335be1: ae1 &lt;br /&gt;
Content-Length: 133 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''Netscape Enterprise 4.1''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc netscape.example.com 80 &lt;br /&gt;
GET / HTTP/3.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 505 HTTP Version Not Supported &lt;br /&gt;
Server: Netscape-Enterprise/4.1 &lt;br /&gt;
Date: Mon, 16 Jun 2003 06:04: 04 GMT &lt;br /&gt;
Content-length: 140 &lt;br /&gt;
Content-type: text/HTML &lt;br /&gt;
Connection: close &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
We notice that every server answers in a different way. The answer differs also by the version of the server. An analogous issue comes if we create requests with a not existing protocol. Consider the following responses: &lt;br /&gt;
&lt;br /&gt;
Response from '''Apache 1.3.23''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc apache.example.com 80 &lt;br /&gt;
GET / JUNK/1.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Date: Sun, 15 Jun 2003 17:17: 47 GMT &lt;br /&gt;
Server: Apache/1.3.23 &lt;br /&gt;
Last-Modified: Thu, 27 Feb 2003 03:48: 19 GMT &lt;br /&gt;
ETag: 32417-c4-3e5d8a83 &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Content-Length: 196 &lt;br /&gt;
Connection: close &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''IIS 5.0''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc iis.example.com 80 &lt;br /&gt;
GET / JUNK/1.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 400 Bad Request &lt;br /&gt;
Server: Microsoft-IIS/5.0 &lt;br /&gt;
Date: Fri, 01 Jan 1999 20:14: 34 GMT &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
Content-Length: 87 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''Netscape Enterprise 4.1''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc netscape.example.com 80 &lt;br /&gt;
GET / JUNK/1.0 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;HTML&amp;gt;&amp;lt;HEAD&amp;gt;&amp;lt;TITLE&amp;gt;Bad request&amp;lt;/TITLE&amp;gt;&amp;lt;/HEAD&amp;gt; &lt;br /&gt;
&amp;lt;BODY&amp;gt;&amp;lt;H1&amp;gt;Bad request&amp;lt;/H1&amp;gt; &lt;br /&gt;
Your browser sent to query this server could not understand. &lt;br /&gt;
&amp;lt;/BODY&amp;gt;&amp;lt;/HTML&amp;gt; &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Automated Testing == &lt;br /&gt;
The tests to carry out can be several. A tool that automates these tests is &amp;quot;''httprint''&amp;quot; that allows, through a signature dictionary, to recognize the type and the version of the web server in use.&amp;lt;br&amp;gt;&lt;br /&gt;
An example of such tool is shown below:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:httprint.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Saumil Shah: &amp;quot;An Introduction to HTTP fingerprinting&amp;quot; - http://net-square.com/httprint/httprint_paper.html&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* httprint - http://net-square.com/httprint/index.shtml&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Testing_for_Web_Application_Fingerprint_(OWASP-IG-004)&amp;diff=13896</id>
		<title>Testing for Web Application Fingerprint (OWASP-IG-004)</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Testing_for_Web_Application_Fingerprint_(OWASP-IG-004)&amp;diff=13896"/>
				<updated>2006-12-01T17:30:04Z</updated>
		
		<summary type="html">&lt;p&gt;Jekist: /* Brief Summary */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[http://www.owasp.org/index.php/Web_Application_Penetration_Testing_AoC Up]]&amp;lt;br&amp;gt;&lt;br /&gt;
{{Template:OWASP Testing Guide v2}}&lt;br /&gt;
&lt;br /&gt;
== Brief Summary ==&lt;br /&gt;
Web server fingerprinting is a critical task for the Penetration tester. Knowing the version and type of a running web server allows testers to determine known vulnerabilities and the appropriate exploits to use during testing.&lt;br /&gt;
&lt;br /&gt;
== Black Box testing and example ==&lt;br /&gt;
The simplest and most basic form of identifying a Web server is to look at the Server field in the HTTP response header. For our experiments we use netcat. &lt;br /&gt;
Consider the following HTTP Request-Response: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc 202.41.76.251 80&lt;br /&gt;
HEAD / HTTP/1.0&lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK&lt;br /&gt;
Date: Mon, 16 Jun 2003 02:53:29 GMT&lt;br /&gt;
Server: Apache/1.3.3 (Unix)  (Red Hat/Linux)&lt;br /&gt;
Last-Modified: Wed, 07 Oct 1998 11:18:14 GMT&lt;br /&gt;
ETag: &amp;quot;1813-49b-361b4df6&amp;quot;&lt;br /&gt;
Accept-Ranges: bytes&lt;br /&gt;
Content-Length: 1179&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: text/html&lt;br /&gt;
&lt;br /&gt;
$&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
from the ''Server'' field we understand that the server is Apache, version 1.3.3, running on Linux operating system.&lt;br /&gt;
Three examples of the HTTP response headers are shown below:&lt;br /&gt;
&lt;br /&gt;
From an '''Apache 1.3.23''' server: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Date: Sun, 15 Jun 2003 17:10: 49 GMT &lt;br /&gt;
Server: Apache/1.3.23 &lt;br /&gt;
Last-Modified: Thu, 27 Feb 2003 03:48: 19 GMT &lt;br /&gt;
ETag: 32417-c4-3e5d8a83 &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Content-Length: 196 &lt;br /&gt;
Connection: close &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
From a '''Microsoft IIS 5.0''' server:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Server: Microsoft-IIS/5.0 &lt;br /&gt;
Expires: Yours, 17 Jun 2003 01:41: 33 GMT &lt;br /&gt;
Date: Mon, 16 Jun 2003 01:41: 33 GMT &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Last-Modified: Wed, 28 May 2003 15:32: 21 GMT &lt;br /&gt;
ETag: b0aac0542e25c31: 89d &lt;br /&gt;
Content-Length: 7369 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
From a '''Netscape Enterprise 4.1''' server: &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Server: Netscape-Enterprise/4.1 &lt;br /&gt;
Date: Mon, 16 Jun 2003 06:19: 04 GMT &lt;br /&gt;
Content-type: text/HTML &lt;br /&gt;
Last-modified: Wed, 31 Jul 2002 15:37: 56 GMT &lt;br /&gt;
Content-length: 57 &lt;br /&gt;
Accept-ranges: bytes &lt;br /&gt;
Connection: close &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
This testing methodology however is not so good. There are several techniques that allow to obfuscate or to modify the server banner string.&lt;br /&gt;
For example we could obtain the following answer:&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
403 HTTP/1.1 &lt;br /&gt;
Forbidden Date: Mon, 16 Jun 2003 02:41: 27 GMT &lt;br /&gt;
Server: Unknown-Webserver/1.0 &lt;br /&gt;
Connection: close &lt;br /&gt;
Content-Type: text/HTML; &lt;br /&gt;
charset=iso-8859-1 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
In this case the server field of that response is obfuscated: we cannot know what type of web server is running.&lt;br /&gt;
&lt;br /&gt;
== Protocol behaviour == &lt;br /&gt;
Refined techniques of testing take in consideration various characteristics of the several web servers available on the market. We will list some methodologies that allow us to deduce the type of web server in use.&lt;br /&gt;
&lt;br /&gt;
=== HTTP header field ordering === &lt;br /&gt;
The first method consists in observing the ordering of the several headers in the response. Every web server has just an inner ordering of the header. We consider the following answers as an example:&lt;br /&gt;
&lt;br /&gt;
Response from '''Apache 1.3.23''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc apache.example.com 80 &lt;br /&gt;
HEAD / HTTP/1.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Date: Sun, 15 Jun 2003 17:10: 49 GMT &lt;br /&gt;
Server: Apache/1.3.23 &lt;br /&gt;
Last-Modified: Thu, 27 Feb 2003 03:48: 19 GMT &lt;br /&gt;
ETag: 32417-c4-3e5d8a83 &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Content-Length: 196 &lt;br /&gt;
Connection: close &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''IIS 5.0''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc iis.example.com 80 &lt;br /&gt;
HEAD / HTTP/1.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Server: Microsoft-IIS/5.0 &lt;br /&gt;
Content-Location: http://iis.example.com/Default.htm &lt;br /&gt;
Date: Fri, 01 Jan 1999 20:13: 52 GMT &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Last-Modified: Fri, 01 Jan 1999 20:13: 52 GMT &lt;br /&gt;
ETag: W/e0d362a4c335be1: ae1 &lt;br /&gt;
Content-Length: 133 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''Netscape Enterprise 4.1''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc netscape.example.com 80 &lt;br /&gt;
HEAD / HTTP/1.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Server: Netscape-Enterprise/4.1 &lt;br /&gt;
Date: Mon, 16 Jun 2003 06:01: 40 GMT &lt;br /&gt;
Content-type: text/HTML &lt;br /&gt;
Last-modified: Wed, 31 Jul 2002 15:37: 56 GMT &lt;br /&gt;
Content-length: 57 &lt;br /&gt;
Accept-ranges: bytes &lt;br /&gt;
Connection: close &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
We can notice that the ordering of the ''Date'' field and the ''Server'' field differs between Apache, Netscape Enterprise and IIS.&lt;br /&gt;
&lt;br /&gt;
=== Malformed requests test === &lt;br /&gt;
Another useful test to execute consists in sending  malformed requests to the server, or requests of nonexistent pages.&lt;br /&gt;
We consider the following HTTP response: &lt;br /&gt;
&lt;br /&gt;
Response from '''Apache 1.3.23'''&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc apache.example.com 80 &lt;br /&gt;
GET / HTTP/3.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 400 Bad Request &lt;br /&gt;
Date: Sun, 15 Jun 2003 17:12: 37 GMT &lt;br /&gt;
Server: Apache/1.3.23 &lt;br /&gt;
Connection: close &lt;br /&gt;
Transfer: chunked &lt;br /&gt;
Content-Type: text/HTML; charset=iso-8859-1 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''IIS 5.0''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc iis.example.com 80 &lt;br /&gt;
GET / HTTP/3.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Server: Microsoft-IIS/5.0 &lt;br /&gt;
Content-Location: http://iis.example.com/Default.htm &lt;br /&gt;
Date: Fri, 01 Jan 1999 20:14: 02 GMT &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Last-Modified: Fri, 01 Jan 1999 20:14: 02 GMT &lt;br /&gt;
ETag: W/e0d362a4c335be1: ae1 &lt;br /&gt;
Content-Length: 133 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''Netscape Enterprise 4.1''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc netscape.example.com 80 &lt;br /&gt;
GET / HTTP/3.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 505 HTTP Version Not Supported &lt;br /&gt;
Server: Netscape-Enterprise/4.1 &lt;br /&gt;
Date: Mon, 16 Jun 2003 06:04: 04 GMT &lt;br /&gt;
Content-length: 140 &lt;br /&gt;
Content-type: text/HTML &lt;br /&gt;
Connection: close &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
We notice that every server answers in a different way. The answer differs also by the version of the server. An analogous issue comes if we create requests with a not existing protocol. Consider the following responses: &lt;br /&gt;
&lt;br /&gt;
Response from '''Apache 1.3.23''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc apache.example.com 80 &lt;br /&gt;
GET / JUNK/1.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 200 OK &lt;br /&gt;
Date: Sun, 15 Jun 2003 17:17: 47 GMT &lt;br /&gt;
Server: Apache/1.3.23 &lt;br /&gt;
Last-Modified: Thu, 27 Feb 2003 03:48: 19 GMT &lt;br /&gt;
ETag: 32417-c4-3e5d8a83 &lt;br /&gt;
Accept-Ranges: bytes &lt;br /&gt;
Content-Length: 196 &lt;br /&gt;
Connection: close &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''IIS 5.0''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc iis.example.com 80 &lt;br /&gt;
GET / JUNK/1.0 &lt;br /&gt;
&lt;br /&gt;
HTTP/1.1 400 Bad Request &lt;br /&gt;
Server: Microsoft-IIS/5.0 &lt;br /&gt;
Date: Fri, 01 Jan 1999 20:14: 34 GMT &lt;br /&gt;
Content-Type: text/HTML &lt;br /&gt;
Content-Length: 87 &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
Response from '''Netscape Enterprise 4.1''' &lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
$ nc netscape.example.com 80 &lt;br /&gt;
GET / JUNK/1.0 &lt;br /&gt;
&lt;br /&gt;
&amp;lt;HTML&amp;gt;&amp;lt;HEAD&amp;gt;&amp;lt;TITLE&amp;gt;Bad request&amp;lt;/TITLE&amp;gt;&amp;lt;/HEAD&amp;gt; &lt;br /&gt;
&amp;lt;BODY&amp;gt;&amp;lt;H1&amp;gt;Bad request&amp;lt;/H1&amp;gt; &lt;br /&gt;
Your browser sent to query this server could not understand. &lt;br /&gt;
&amp;lt;/BODY&amp;gt;&amp;lt;/HTML&amp;gt; &lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Automated Testing == &lt;br /&gt;
The tests to carry out can be several. A tool that automates these tests is &amp;quot;''httprint''&amp;quot; that allows, through a signature dictionary, to recognize the type and the version of the web server in use.&amp;lt;br&amp;gt;&lt;br /&gt;
An example of such tool is shown below:&amp;lt;br&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
[[Image:httprint.jpg]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== References ==&lt;br /&gt;
'''Whitepapers'''&amp;lt;br&amp;gt;&lt;br /&gt;
* Saumil Shah: &amp;quot;An Introduction to HTTP fingerprinting&amp;quot; - http://net-square.com/httprint/httprint_paper.html&lt;br /&gt;
'''Tools'''&amp;lt;br&amp;gt;&lt;br /&gt;
* httprint - http://net-square.com/httprint/index.shtml&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
{{Category:OWASP Testing Project AoC}}&lt;/div&gt;</summary>
		<author><name>Jekist</name></author>	</entry>

	</feed>