<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Josh+Amishav-Zlatin</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Josh+Amishav-Zlatin"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Josh_Amishav-Zlatin"/>
		<updated>2026-04-26T15:10:00Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Jerusalem_2013_04&amp;diff=150256</id>
		<title>OWASP Jerusalem 2013 04</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Jerusalem_2013_04&amp;diff=150256"/>
				<updated>2013-04-22T11:30:22Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Jerusalem Apr 2013 meeting was held on the 3/4/2013 Tuesday at the Bynet building in Har Hozvim in Jerusalem.&lt;br /&gt;
&lt;br /&gt;
The meeting’s agenda was as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Josh Amishav-Zlatin - A is for Anonymous and Application Layer DoS Attacks:'''&lt;br /&gt;
&lt;br /&gt;
'''Slides: http://prezi.com/b5rmsx4lrxwo/a-is-for-anonymous-and-application-layer-dos-attacks/'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Abstract: Denial of service (DoS) attacks are like an annoying pest that wont go&lt;br /&gt;
away. DoS attacks are a persistent problem on the Internet, which are&lt;br /&gt;
extremely difficult to solve in a scalable fashion. According to WHID data,&lt;br /&gt;
Denial of Service attacks make up a very significant portion of web based&lt;br /&gt;
attacks. Despite efforts to code your app securely, a malicious user with&lt;br /&gt;
minimum bandwidth might still be able to take your application offline at&lt;br /&gt;
will. In this talk, we will focus on Slow HTTP DoS attacks which have been&lt;br /&gt;
a popular attack method by various hacktivist groups such as Anonymous. We&lt;br /&gt;
will also discuss several techniques that can be used to mitigate this&lt;br /&gt;
threat.&lt;br /&gt;
&lt;br /&gt;
Bio: Josh leads the R&amp;amp;D team at Pure Hacking where he focuses on web application defensive research and develops customized ModSecurity rulesets to help customers reduce risk associated with their web applications. Josh specializes in web application penetration testing and FOSS based security solutions. He is an active member of the ModSecurity community and is currently involved with the OWASP Core Rule Set, AuditConsole and WASC Threat Classification projects. Josh has over 10 years of experience in the IT security industry, working with both financial and government clients to help secure their critical applications&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan researches strategic and tactical cyber attack methods from databases, telecommunication and phreaking as well as medical field attacks.&lt;br /&gt;
He works as a cyber intelligence analyst at Black Cube&lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
&lt;br /&gt;
'''The workshop will be delivered in English.'''&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=149162</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=149162"/>
				<updated>2013-04-04T14:35:38Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
; [[OWASP_Jerusalem_2013_04|OWASP Jerusalem Apr-2013]]  meeting was held at Intel on April 3rd 2013.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=149161</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=149161"/>
				<updated>2013-04-04T13:58:42Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
; [[OWASP_Jerusalem_2013_04|OWASP Israel Apr-2013]]  meeting was held at Intel on April 3rd 2013.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Jerusalem_2013_04&amp;diff=149160</id>
		<title>OWASP Jerusalem 2013 04</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Jerusalem_2013_04&amp;diff=149160"/>
				<updated>2013-04-04T13:56:26Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: Created page with &amp;quot;OWASP Jerusalem Apr 2013 meeting was held on the 3/4/2013 Tuesday at the Bynet building in Har Hozvim in Jerusalem.  The meeting’s agenda was as follows:  '''Gathering - Ref...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;OWASP Jerusalem Apr 2013 meeting was held on the 3/4/2013 Tuesday at the Bynet building in Har Hozvim in Jerusalem.&lt;br /&gt;
&lt;br /&gt;
The meeting’s agenda was as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Josh Amishav-Zlatin - A is for Anonymous and Application Layer DoS Attacks:'''&lt;br /&gt;
&lt;br /&gt;
Abstract: Denial of service (DoS) attacks are like an annoying pest that wont go&lt;br /&gt;
away. DoS attacks are a persistent problem on the Internet, which are&lt;br /&gt;
extremely difficult to solve in a scalable fashion. According to WHID data,&lt;br /&gt;
Denial of Service attacks make up a very significant portion of web based&lt;br /&gt;
attacks. Despite efforts to code your app securely, a malicious user with&lt;br /&gt;
minimum bandwidth might still be able to take your application offline at&lt;br /&gt;
will. In this talk, we will focus on Slow HTTP DoS attacks which have been&lt;br /&gt;
a popular attack method by various hacktivist groups such as Anonymous. We&lt;br /&gt;
will also discuss several techniques that can be used to mitigate this&lt;br /&gt;
threat.&lt;br /&gt;
&lt;br /&gt;
Bio: Josh leads the R&amp;amp;D team at Pure Hacking where he focuses on web application defensive research and develops customized ModSecurity rulesets to help customers reduce risk associated with their web applications. Josh specializes in web application penetration testing and FOSS based security solutions. He is an active member of the ModSecurity community and is currently involved with the OWASP Core Rule Set, AuditConsole and WASC Threat Classification projects. Josh has over 10 years of experience in the IT security industry, working with both financial and government clients to help secure their critical applications&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan researches strategic and tactical cyber attack methods from databases, telecommunication and phreaking as well as medical field attacks.&lt;br /&gt;
He works as a cyber intelligence analyst at Black Cube&lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
&lt;br /&gt;
'''The workshop will be delivered in English.'''&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=149159</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=149159"/>
				<updated>2013-04-04T13:53:06Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Previous Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our last chapter meeting was on April 3rd 2013 at 18:00. The agenda was as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Josh Amishav-Zlatin - A is for Anonymous and Application Layer DoS Attacks:'''&lt;br /&gt;
&lt;br /&gt;
Abstract: Denial of service (DoS) attacks are like an annoying pest that wont go&lt;br /&gt;
away. DoS attacks are a persistent problem on the Internet, which are&lt;br /&gt;
extremely difficult to solve in a scalable fashion. According to WHID data,&lt;br /&gt;
Denial of Service attacks make up a very significant portion of web based&lt;br /&gt;
attacks. Despite efforts to code your app securely, a malicious user with&lt;br /&gt;
minimum bandwidth might still be able to take your application offline at&lt;br /&gt;
will. In this talk, we will focus on Slow HTTP DoS attacks which have been&lt;br /&gt;
a popular attack method by various hacktivist groups such as Anonymous. We&lt;br /&gt;
will also discuss several techniques that can be used to mitigate this&lt;br /&gt;
threat.&lt;br /&gt;
&lt;br /&gt;
Bio: Josh leads the R&amp;amp;D team at Pure Hacking where he focuses on web application defensive research and develops customized ModSecurity rulesets to help customers reduce risk associated with their web applications. Josh specializes in web application penetration testing and FOSS based security solutions. He is an active member of the ModSecurity community and is currently involved with the OWASP Core Rule Set, AuditConsole and WASC Threat Classification projects. Josh has over 10 years of experience in the IT security industry, working with both financial and government clients to help secure their critical applications&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan researches strategic and tactical cyber attack methods from databases, telecommunication and phreaking as well as medical field attacks.&lt;br /&gt;
He works as a cyber intelligence analyst at Black Cube&lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
&lt;br /&gt;
'''The workshop will be delivered in English.'''&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=148431</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=148431"/>
				<updated>2013-03-24T09:33:49Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Josh Amishav-Zlatin - A is for Anonymous and Application Layer DoS Attacks:'''&lt;br /&gt;
&lt;br /&gt;
Abstract: Denial of service (DoS) attacks are like an annoying pest that wont go&lt;br /&gt;
away. DoS attacks are a persistent problem on the Internet, which are&lt;br /&gt;
extremely difficult to solve in a scalable fashion. According to WHID data,&lt;br /&gt;
Denial of Service attacks make up a very significant portion of web based&lt;br /&gt;
attacks. Despite efforts to code your app securely, a malicious user with&lt;br /&gt;
minimum bandwidth might still be able to take your application offline at&lt;br /&gt;
will. In this talk, we will focus on Slow HTTP DoS attacks which have been&lt;br /&gt;
a popular attack method by various hacktivist groups such as Anonymous. We&lt;br /&gt;
will also discuss several techniques that can be used to mitigate this&lt;br /&gt;
threat.&lt;br /&gt;
&lt;br /&gt;
Bio: Josh leads the R&amp;amp;D team at Pure Hacking where he focuses on web application defensive research and develops customized ModSecurity rulesets to help customers reduce risk associated with their web applications. Josh specializes in web application penetration testing and FOSS based security solutions. He is an active member of the ModSecurity community and is currently involved with the OWASP Core Rule Set, AuditConsole and WASC Threat Classification projects. Josh has over 10 years of experience in the IT security industry, working with both financial and government clients to help secure their critical applications&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan researches strategic and tactical cyber attack methods from databases, telecommunication and phreaking as well as medical field attacks.&lt;br /&gt;
He works as a cyber intelligence analyst at Black Cube&lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
&lt;br /&gt;
'''The workshop will be delivered in English.'''&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=148126</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=148126"/>
				<updated>2013-03-19T13:19:01Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Almog Ohayon - DNS Hacks and Attacks'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan researches strategic and tactical cyber attack methods from databases, telecommunication and phreaking as well as medical field attacks.&lt;br /&gt;
He works as a cyber intelligence analyst at Black Cube&lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
&lt;br /&gt;
'''The workshop will be delivered in English.'''&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=148125</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=148125"/>
				<updated>2013-03-19T13:13:45Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Almog Ohayon - DNS Hacks and Attacks'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan researches strategic and tactical cyber attack methods from databases, telecommunication and phreaking as well as medical field attacks.&lt;br /&gt;
He is working as a cyber intelligence analyst in Black Cube&lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
&lt;br /&gt;
'''The workshop will be delivered in English.'''&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=148124</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=148124"/>
				<updated>2013-03-19T12:55:36Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: removed: Amitay Dan is a Cyber Intelligence Analyst at Black Cube where he works on strategic and tactical cyber methods from databases, telecommunication and phreaking as well as medical field attack and other interesting areas.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Almog Ohayon - DNS Hacks and Attacks'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan works on strategic and tactical cyber methods from databases,telecommunication and phreaking as well as medical field attack and other interesting area.&lt;br /&gt;
He is working as a cyber intelligence analyst in Black Cube&lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
&lt;br /&gt;
'''The workshop will be delivered in English.'''&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147869</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147869"/>
				<updated>2013-03-14T09:15:59Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Almog Ohayon - DNS Hacks and Attacks'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan is a Cyber Intelligence Analyst at Black Cube where he works on strategic and tactical cyber methods from databases, telecommunication and phreaking as well as medical field attack and other interesting areas. &lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
&lt;br /&gt;
'''The workshop will be delivered in English.'''&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147849</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147849"/>
				<updated>2013-03-13T18:11:27Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Almog Ohayon - DNS Hacks and Attacks'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan is a Cyber Intelligence Analyst at Black Cube where he works on strategic and tactical cyber methods from databases, telecommunication and phreaking as well as medical field attack and other interesting areas. &lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
&lt;br /&gt;
'''The workshop will be delivered in English.'''&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147848</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147848"/>
				<updated>2013-03-13T18:11:00Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Almog Ohayon - DNS Hacks and Attacks'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan is a Cyber Intelligence Analyst at Black Cube where he works on strategic and tactical cyber methods from databases, telecommunication and phreaking as well as medical field attack and other interesting areas. &lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
'''The workshop will be delivered in English.'''&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147847</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147847"/>
				<updated>2013-03-13T18:10:29Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Almog Ohayon - DNS Hacks and Attacks'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan is a Cyber Intelligence Analyst at Black Cube where he works on strategic and tactical cyber methods from databases, telecommunication and phreaking as well as medical field attack and other interesting areas. &lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
**The workshop will be delivered in English.**&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147846</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147846"/>
				<updated>2013-03-13T18:09:59Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
'''Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15'''&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Almog Ohayon () - DNS Hacks and Attacks'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan is a Cyber Intelligence Analyst at Black Cube where he works on strategic and tactical cyber methods from databases, telecommunication and phreaking as well as medical field attack and other interesting areas. &lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
**The workshop will be delivered in English.**&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147845</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147845"/>
				<updated>2013-03-13T18:09:40Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15&lt;br /&gt;
&lt;br /&gt;
'''First Lecture 18:15-18:45 Almog Ohayon () - DNS Hacks and Attacks'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
'''Second Lecture 18:50-19:25 Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan is a Cyber Intelligence Analyst at Black Cube where he works on strategic and tactical cyber methods from databases, telecommunication and phreaking as well as medical field attack and other interesting areas. &lt;br /&gt;
&lt;br /&gt;
'''Workshop 19:30-20:30 David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
**The workshop will be delivered in English.**&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147844</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147844"/>
				<updated>2013-03-13T18:08:50Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15&lt;br /&gt;
&lt;br /&gt;
First Lecture 18:15-18:45&lt;br /&gt;
'''Almog Ohayon () - DNS Hacks and Attacks'''&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
Second Lecture 18:50-19:25&lt;br /&gt;
'''Amitay Dan - Car Phone Intelligence''' &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan is a Cyber Intelligence Analyst at Black Cube where he works on strategic and tactical cyber methods from databases, telecommunication and phreaking as well as medical field attack and other interesting areas. &lt;br /&gt;
&lt;br /&gt;
Workshop 19:30-20:30 &lt;br /&gt;
'''David Kaplan - Intro to Timing Attacks '''&lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
**The workshop will be delivered in English.**&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147843</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=147843"/>
				<updated>2013-03-13T18:07:12Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: Updated April event&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Upcoming Meetings ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Bynet building (next to Intel), Har Hozvim - Jerusalem'''&lt;br /&gt;
Our next chapter meeting will be on April 3rd 2013 at 18:00. The agenda is as follows:&lt;br /&gt;
&lt;br /&gt;
Gathering - Refreshments &amp;amp; Opening Remarks: 18:00-18:15&lt;br /&gt;
&lt;br /&gt;
First Lecture 18:15-18:45&lt;br /&gt;
Almog Ohayon () - DNS Hacks and Attacks&lt;br /&gt;
&lt;br /&gt;
Abstract:&lt;br /&gt;
DNS is one of the main components of each company and organization. Any damage can easily negatively affect the company's business and availability, thus it is a primary focus of hackers. We will delve into the world of of DNS and present the latest DNS attacks from around the world.&lt;br /&gt;
&lt;br /&gt;
Bio: Almog is a communications and information security expert with over two decades of experience. He works at ioptimize.it&lt;br /&gt;
&lt;br /&gt;
Second Lecture 18:50-19:25&lt;br /&gt;
Amitay Dan - Car Phone Intelligence &lt;br /&gt;
&lt;br /&gt;
Many hackers try to demonstrate how to attack cars and mobile phones, but like any other battle there is a need for proper Intelligence. This lecture will show how to use systematic flaws like number's floor, hidden numbers and tenders to pinpoint and attack targets. In the close future almost every car will have a cellular modem, thus we need to start creating our defense right now. &lt;br /&gt;
&lt;br /&gt;
Bio: Amitay Dan is a Cyber Intelligence Analyst at Black Cube where he works on strategic and tactical cyber methods from databases, telecommunication and phreaking as well as medical field attack and other interesting areas. &lt;br /&gt;
&lt;br /&gt;
Workshop 19:30-20:30 &lt;br /&gt;
David Kaplan - Intro to Timing Attacks &lt;br /&gt;
&lt;br /&gt;
Timing Attacks have become popular over the past number of years and have been employed successfully against numerous targets ranging from network-based attacks to games consoles.&lt;br /&gt;
During the hour-long workshop, participants will have a chance to learn about simple software timing attacks and will attempt to attack vulnerable pieces of software.&lt;br /&gt;
Participants are required to bring their own laptops. A Virtual Box image with all tools needed for the workshop will be provided in advance of the day (participants are expected to have this installed prior to the start of the workshop).&lt;br /&gt;
Some experience with Linux – an advantage.&lt;br /&gt;
Programming experience – a must (Python + gcc will be provided in the VM, any other languages participants should bring necessary software).&lt;br /&gt;
**The workshop will be delivered in English.**&lt;br /&gt;
&lt;br /&gt;
Bio: Security Researcher working for Intel Corp. by day and hacker by night - breaking things for both fun and profit!&lt;br /&gt;
Previously part of the red team at NDS (now Cisco).&lt;br /&gt;
Interested in all things security; with a special interest in real-time and Linux-based embedded systems.&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Josh_Amishav-Zlatin&amp;diff=147686</id>
		<title>User:Josh Amishav-Zlatin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Josh_Amishav-Zlatin&amp;diff=147686"/>
				<updated>2013-03-12T15:45:50Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Josh leads the R&amp;amp;D team at Pure Hacking where he focuses on web application defensive research and develops customized ModSecurity rulesets to help customers reduce risk associated with their web applications. Josh specializes in web application penetration testing and FOSS based security solutions. He is an active member of the ModSecurity community and is currently involved with the OWASP Core Rule Set, AuditConsole and WASC Threat Classification projects. Josh has over 10 years of experience in the IT security industry, working with both financial and government clients to help secure their critical applications.&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=142769</id>
		<title>Jerusalem</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Jerusalem&amp;diff=142769"/>
				<updated>2013-01-24T09:16:50Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: Added Jacob's contact detail&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Jerusalem|extra=The chapter leaders are [mailto:jamuse@owasp.org Josh Amishav-Zlatin] and [mailto:5013box@gmail.com Jacob Kili].|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Jerusalem|emailarchives=http://lists.owasp.org/pipermail/owasp-Jerusalem}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
 '''Meeting Location: Intel Jerusalem'''&lt;br /&gt;
&lt;br /&gt;
Everyone is welcome to join us at our chapter meetings.&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP Chapter]]&lt;br /&gt;
[[Category:Middle East]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Defenders&amp;diff=139391</id>
		<title>Defenders</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Defenders&amp;diff=139391"/>
				<updated>2012-11-13T21:25:46Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==== OWASP Defenders  ====&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;100%&amp;quot;&lt;br /&gt;
|- valign=&amp;quot;top&amp;quot;&lt;br /&gt;
| &lt;br /&gt;
'''Defenders Community''' &lt;br /&gt;
&lt;br /&gt;
A community of security professionals and stakeholders with the common goal of advancing the state of security in the area of application defense, including the tools and techniques that enable the detection and response to application layer attacks. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Examples''' &lt;br /&gt;
&lt;br /&gt;
AppSensor, ModSecurity, Real Time Log Analysis, Application Trending Techniques &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Target Audience''' &lt;br /&gt;
&lt;br /&gt;
Application Security Professionals, Infrastructure Security Teams, Developers looking to integrate defensive technologies &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''What Are OWASP Communities?'''&lt;br /&gt;
&lt;br /&gt;
[http://www.owasp.org/index.php/Builders Builders], [http://www.owasp.org/index.php/Breakers Breakers] and Defenders; the idea of OWASP Communities is to bring together experts in the area that they are best at with the common goal of advancing the state of application security.  This approach allows similar groups of professionals and experts to tackle security problems with the involvement of the most relevant stakeholders.  The intent is to drive high quality output that is immediately usable by the target audience.  More information about this vision can be found [http://michael-coates.blogspot.com/2011/02/vision-for-owasp.html here]&lt;br /&gt;
&lt;br /&gt;
| &lt;br /&gt;
[[Image:OWASP-vision.jpg]] &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
==== The Community  ====&lt;br /&gt;
&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
{| cellspacing=&amp;quot;1&amp;quot; cellpadding=&amp;quot;1&amp;quot; style=&amp;quot;width: 404px; height: 413px;&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:MichaelCoates-OWASP.jpg|100px]]&amp;lt;br&amp;gt; &lt;br /&gt;
| '''Michael Coates''' &amp;lt;br&amp;gt; Mozilla &amp;lt;br&amp;gt; michael.coates@owasp.org &amp;lt;br&amp;gt; http://michael-coates.blogspot.com &amp;lt;br&amp;gt; @_mwc&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:JohnMelton-OWASP.jpg|100px]] &amp;lt;br&amp;gt; &lt;br /&gt;
| '''John Melton''' &amp;lt;br&amp;gt; Wells Fargo &amp;lt;br&amp;gt; john.melton@owasp.org &amp;lt;br&amp;gt; http://www.jtmelton.com &amp;lt;br&amp;gt; &lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:IvanRistic-OWASP.jpg|100px]]&amp;lt;br&amp;gt; &lt;br /&gt;
|  '''Ivan Ristic''' &amp;lt;br&amp;gt; Qualys &amp;lt;br&amp;gt; ivanr@webkreator.com &amp;lt;br&amp;gt; http://blog.ivanristic.com/ &amp;lt;br&amp;gt; @ivanristic&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:ColinWatson-OWASP.jpg|100px]] &amp;lt;br&amp;gt; &lt;br /&gt;
| '''Colin Watson''' &amp;lt;br&amp;gt; Watson Hall Ltd. &amp;lt;br&amp;gt; colin.watson@owasp.org &amp;lt;br&amp;gt; http://www.clerkendweller.com &amp;lt;br&amp;gt; @clerkendweller&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:RyanBarnett-OWASP.jpg|100px]]&amp;lt;br&amp;gt;&lt;br /&gt;
| '''Ryan Barnett'''&amp;lt;br&amp;gt; Trustwave &amp;lt;br&amp;gt; ryan.barnett@owasp.org &amp;lt;br&amp;gt; http://tacticalwebappsec.blogspot.com/ &amp;lt;br&amp;gt; @ryancbarnett&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:LucasFerreira-OWASP.jpg|100px]] &amp;lt;br&amp;gt;&lt;br /&gt;
| '''Lucas C. Ferreira'''&amp;lt;br&amp;gt; Câmara dos Deputados (Brazilian Chamber of Deputies) &amp;lt;br&amp;gt; lucas.ferreira@owasp.org &amp;lt;br&amp;gt; http://blog.sapao.net &amp;lt;br&amp;gt; @lucassapao&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| [[Image:PrzemyslawSkowron-OWASP.jpg|100px]] &amp;lt;br&amp;gt;&lt;br /&gt;
| '''Przemyslaw Skowron'''&amp;lt;br&amp;gt; Alior Bank S.A. &amp;lt;br&amp;gt; przemyslaw.skowron@owasp.org &amp;lt;br&amp;gt; - &amp;lt;br&amp;gt; -&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
|  &amp;amp;nbsp;&lt;br /&gt;
| '''Chen King'''&amp;lt;br&amp;gt; &amp;amp;nbsp; &amp;lt;br&amp;gt; &amp;amp;nbsp;&amp;lt;br&amp;gt; &amp;amp;nbsp;&lt;br /&gt;
| &lt;br /&gt;
| &lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| '''Fernando A. Damião'''&amp;lt;br&amp;gt; &amp;amp;nbsp; &amp;lt;br&amp;gt; &amp;amp;nbsp;&amp;lt;br&amp;gt; &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| '''Yvan Boily'''&amp;lt;br&amp;gt; yvanboily@gmail.com &amp;lt;br&amp;gt; @ygjb &amp;lt;br&amp;gt; &amp;amp;nbsp;&lt;br /&gt;
|&lt;br /&gt;
|&lt;br /&gt;
|-&lt;br /&gt;
| &amp;amp;nbsp;&lt;br /&gt;
| '''Josh Amishav-Zlatin'''&amp;lt;br&amp;gt; jamuse@gmail.com &amp;lt;br&amp;gt; @jamuse &amp;lt;br&amp;gt; &amp;amp;nbsp;&lt;br /&gt;
|  &lt;br /&gt;
&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
Want to contribute to the OWASP Defenders Community? &amp;lt;br&amp;gt;Add your info and send an email to [mailto:michael.coates@owasp.org michael.coates@owasp.org]&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== Roadmap  ====&lt;br /&gt;
* Determine the current market need. This requires involvement from people in enterprise that are tacking these problems. No guessing about what we think people need. &lt;br /&gt;
* Evaluate current OWASP projects to understand match with market need and quality of projects &lt;br /&gt;
* Identify 3-4 projects that will be focused on for growth and promotion &lt;br /&gt;
* Archive other projects (within defender domain) that are abandoned or not inline with market need &lt;br /&gt;
* Cross training - We should all be able to help out to advance our 3-4 core projects&lt;br /&gt;
* Significantly advance quality of selected projects&lt;br /&gt;
* Community outreach for adoption&lt;br /&gt;
* High quality marketing efforts&lt;br /&gt;
* Conference presentations across multiple projects&lt;br /&gt;
&lt;br /&gt;
==== Official Defender Projects  ====&lt;br /&gt;
&lt;br /&gt;
To be determined - see roadmap &lt;br /&gt;
&lt;br /&gt;
==== All Defender Related Projects ====&lt;br /&gt;
All projects that are related to the OWASP Defenders community can be found at the following link: [[:Category:OWASP_Defenders]]&lt;br /&gt;
&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &amp;lt;br&amp;gt;&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=ModSecurity_CRS_RuleID-960000&amp;diff=132223</id>
		<title>ModSecurity CRS RuleID-960000</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=ModSecurity_CRS_RuleID-960000&amp;diff=132223"/>
				<updated>2012-06-27T13:20:08Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: Created page with &amp;quot;== Rule ID: 960000 ==  &amp;lt;table style=&amp;quot;border-style:double;border-width:3px;&amp;quot; &amp;gt; &amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:upperc...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Rule ID: 960000 ==&lt;br /&gt;
&lt;br /&gt;
&amp;lt;table style=&amp;quot;border-style:double;border-width:3px;&amp;quot; &amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule ID&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
960000&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule Message&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Attempted multipart/form-data bypass&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule Summary&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Identify multipart/form-data name evasion attempts&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Impact&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
2 - Critical&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
&amp;lt;code&amp;gt;&lt;br /&gt;
SecRule FILES_NAMES|FILES &amp;quot;['\&amp;quot;;=]&amp;quot; &amp;quot;phase:2,t:none,id:'960000',rev:'2.2.5',block,capture,msg:'Attempted multipart/form-data bypass',logdata:'%{matched_var}',severity:'2',setvar:'tx.msg=%{rule.msg}',setvar:'tx.id=%{rule.id}',tag:'RULE_MATURITY/7',tag:'RULE_ACCURACY/7',tag:'https://www.owasp.org/index.php/ModSecurity_CRS_RuleID-%{tx.id}',setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:tx.protocol_violation_score=+%{tx.notice_anomaly_score},setvar:tx.%{rule.id}-PROTOCOL_VIOLATION/INVALID_REQ-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&amp;lt;/code&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Detailed Rule Information&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
*There are possible impedance mismatches between how ModSecurity interprets multipart file names and how a destination app server such as PHP might parse the Content-Disposition data.&lt;br /&gt;
*These rules check for the existence of the ' &amp;quot; ; = meta-characters in either the file or file name variables in order to detect evasion attempts.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
///  A description of the regular expression:&lt;br /&gt;
///  &lt;br /&gt;
///  Match any (single) character contained within the brackets&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Example Payload&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;fileRap&amp;quot;; filename=&amp;quot;file=.txt&amp;quot;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Example Audit Log Entry&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Include an example ModSecurity Audit Log Entry for when this rule matchs.&lt;br /&gt;
&amp;lt;pre&amp;gt;&lt;br /&gt;
--50b28e4c-A--&lt;br /&gt;
[27/Jun/2012:16:07:22 +0300] T@sFin8AAQEAADwGDRIAAAAA 127.0.0.1 56803 127.0.0.1 80&lt;br /&gt;
--50b28e4c-B--&lt;br /&gt;
POST /fileupload.asp HTTP/1.1&lt;br /&gt;
Host: localhost&lt;br /&gt;
Accept: */*&lt;br /&gt;
Accept-Language: en&lt;br /&gt;
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.0)&lt;br /&gt;
Connection: close&lt;br /&gt;
Referer: http://localhost/&lt;br /&gt;
Content-Type: multipart/form-data; boundary=--------397236876&lt;br /&gt;
Content-Length: 930&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-C--&lt;br /&gt;
----------397236876&lt;br /&gt;
Content-Disposition: form-data; name=&amp;quot;fileRap&amp;quot;; filename=&amp;quot;file=.txt&amp;quot;&lt;br /&gt;
Content-Type: text/plain&lt;br /&gt;
&lt;br /&gt;
555-555-0199@example.com&lt;br /&gt;
----------397236876&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-F--&lt;br /&gt;
HTTP/1.1 403 Forbidden&lt;br /&gt;
Vary: Accept-Encoding&lt;br /&gt;
Content-Length: 307&lt;br /&gt;
Connection: close&lt;br /&gt;
Content-Type: text/html; charset=iso-8859-1&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-E--&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-H--&lt;br /&gt;
Message: Access denied with code 403 (phase 2). Pattern match &amp;quot;['\&amp;quot;;=]&amp;quot; at FILES:fileRap. [file &amp;quot;/opt/modsecurity/etc/crs/base_rules/modsecurity_crs_20_protocol_violations.conf&amp;quot;] [line &amp;quot;73&amp;quot;] [id &amp;quot;960000&amp;quot;] [rev &amp;quot;2.2.5&amp;quot;] [msg &amp;quot;Attempted multipart/form-data bypass&amp;quot;] [data &amp;quot;file=.txt&amp;quot;] [severity &amp;quot;CRITICAL&amp;quot;] [tag &amp;quot;RULE_MATURITY/7&amp;quot;] [tag &amp;quot;RULE_ACCURACY/7&amp;quot;] [tag &amp;quot;https://www.owasp.org/index.php/ModSecurity_CRS_RuleID-960000&amp;quot;]&lt;br /&gt;
Action: Intercepted (phase 2)&lt;br /&gt;
Stopwatch: 1340802442388746 3425 (- - -)&lt;br /&gt;
Stopwatch2: 1340802442388746 3425; combined=2114, p1=1798, p2=300, p3=0, p4=0, p5=15, sr=91, sw=1, l=0, gc=0&lt;br /&gt;
Response-Body-Transformed: Dechunked&lt;br /&gt;
Producer: ModSecurity for Apache/2.7.0-dev1 (http://www.modsecurity.org/); core ruleset/2.2.5.&lt;br /&gt;
Server: Apache/2.2.22 (Debian)&lt;br /&gt;
Engine-Mode: &amp;quot;ENABLED&amp;quot;&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-K--&lt;br /&gt;
SecRule &amp;quot;FILES_NAMES|FILES&amp;quot; &amp;quot;@rx ['\&amp;quot;;=]&amp;quot; &amp;quot;phase:2,log,t:none,id:960000,rev:2.2.5,block,capture,msg:'Attempted multipart/form-data bypass',logdata:%{matched_var},severity:2,setvar:tx.msg=%{rule.msg},setvar:tx.id=%{rule.id},tag:RULE_MATURITY/7,tag:RULE_ACCURACY/7,tag:https://www.owasp.org/index.php/ModSecurity_CRS_RuleID-%{tx.id},setvar:tx.anomaly_score=+%{tx.critical_anomaly_score},setvar:tx.protocol_violation_score=+%{tx.notice_anomaly_score},setvar:tx.%{rule.id}-PROTOCOL_VIOLATION/INVALID_REQ-%{matched_var_name}=%{tx.0}&amp;quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
--50b28e4c-Z--&lt;br /&gt;
&lt;br /&gt;
&amp;lt;/pre&amp;gt;&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Attack Scenarios&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
An attacker manipulated the file name which is mistakenly treated as code by the backend server.&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Ease of Attack&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Easy&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Ease of Detection&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Easy with regular expressions&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;False Positives&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
'''None known'''&amp;lt;br&amp;gt;&lt;br /&gt;
If there are any known false positives - specify them here&lt;br /&gt;
Also sign-up for the Reporting False Positives mail-list here:&lt;br /&gt;
https://lists.sourceforge.net/lists/listinfo/mod-security-report-false-positives&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
Send FP Report emails here:&amp;lt;br&amp;gt;&lt;br /&gt;
mod-security-report-false-positives[[Image:Justat.gif|10x]]lists.sourceforge.net&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;False Negatives&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
'''None known'''&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule Maturity&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
'''7'''&amp;lt;br&amp;gt;&lt;br /&gt;
10 point scale (0-9) where:&amp;lt;br&amp;gt;0 = Beta/Experimental &amp;lt;br&amp;gt;9 = Heavily Tested&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule Accuracy&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
'''7'''&amp;lt;br&amp;gt;&lt;br /&gt;
10 point scale (0-9) where:&amp;lt;br&amp;gt;0 = High % of FP&amp;lt;br&amp;gt;5 = No false positives reported&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Rule Documentation Contributor(s)&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
Josh Amishav-Zlatin - jamuse[[Image:Justat.gif|10px]]gmail.com.com&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;tr&amp;gt;&amp;lt;td style=&amp;quot;border-style:solid;border-width:1px;background-color:#CCCCCC;text-transform:uppercase &amp;quot; &amp;gt;Additional References&amp;lt;/td&amp;gt;&lt;br /&gt;
&amp;lt;td style=&amp;quot;background-color:#F2F2F2;table-layout:fixed;width:700px;&amp;quot; &amp;gt;&lt;br /&gt;
http://www.ietf.org/rfc/rfc2183.txt&lt;br /&gt;
&amp;lt;/td&amp;gt;&amp;lt;/tr&amp;gt;&lt;br /&gt;
&amp;lt;/table&amp;gt;&lt;br /&gt;
[[Category:OWASP ModSecurity Core Rule Set Project]]&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Josh_Amishav-Zlatin&amp;diff=107320</id>
		<title>User:Josh Amishav-Zlatin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Josh_Amishav-Zlatin&amp;diff=107320"/>
				<updated>2011-03-22T09:46:25Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Josh is the Director of Research and Development at Pure Hacking and is involved with the OSVDB, WASC Threat Classification and ModSecurity projects.&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Josh_Amishav-Zlatin&amp;diff=102891</id>
		<title>User talk:Josh Amishav-Zlatin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Josh_Amishav-Zlatin&amp;diff=102891"/>
				<updated>2011-02-01T09:18:02Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: Blanked the page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Josh_Amishav-Zlatin&amp;diff=98037</id>
		<title>User:Josh Amishav-Zlatin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Josh_Amishav-Zlatin&amp;diff=98037"/>
				<updated>2010-12-30T21:35:34Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Josh is Senior Security Consultant with Pure Hacking and is involved with the OSVDB, WASC Threat Classification and ModSecurity projects.&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Josh_Amishav-Zlatin&amp;diff=98020</id>
		<title>User talk:Josh Amishav-Zlatin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Josh_Amishav-Zlatin&amp;diff=98020"/>
				<updated>2010-12-30T18:31:48Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Josh is the Director of Research Development at Pure Hacking.&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User_talk:Josh_Amishav-Zlatin&amp;diff=98019</id>
		<title>User talk:Josh Amishav-Zlatin</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User_talk:Josh_Amishav-Zlatin&amp;diff=98019"/>
				<updated>2010-12-30T18:31:16Z</updated>
		
		<summary type="html">&lt;p&gt;Josh Amishav-Zlatin: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Josh is the Director of Research Development at Pure Hacking&lt;/div&gt;</summary>
		<author><name>Josh Amishav-Zlatin</name></author>	</entry>

	</feed>