<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Justin+Searle</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Justin+Searle"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Justin_Searle"/>
		<updated>2026-04-09T19:42:22Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Licenses&amp;diff=141087</id>
		<title>OWASP Licenses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Licenses&amp;diff=141087"/>
				<updated>2012-12-12T17:55:56Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP and Licensing'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation uses several licenses to distribute software, documentation, and other materials. Contact us for agreements concerning acceptance of materials from individuals and corporations, such as existing documents or software projects. These licenses help us ensure that OWASP projects are supported longterm, and the materials produced can be easily used and are free and open to everyone.&lt;br /&gt;
&lt;br /&gt;
==Use of the OWASP Brand==&lt;br /&gt;
&lt;br /&gt;
The use of the OWASP Brand is covered by the [[OWASP brand usage rules]].&lt;br /&gt;
&lt;br /&gt;
==Licensing of OWASP Website Content==&lt;br /&gt;
&lt;br /&gt;
We welcome the use of OWASP website content.  If you would like to use anything from the wiki in another work, you must follow the terms of the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution ShareAlike 3.0 license (CC-BY-SA)]. We strongly encourage organizations to use OWASP materials for their internal purposes.  If you want to distribute modified OWASP materials externally, you must make them available under the CC-BY-SA license - preferably by making your improvements directly at OWASP.  Thanks!&lt;br /&gt;
&lt;br /&gt;
==Licensing of OWASP Projects==&lt;br /&gt;
&lt;br /&gt;
All software, documentation, and other materials produced by The OWASP Foundation or any OWASP Project is licensed according to an open source license as defined by the [[http://opensource.org/licenses/category Open Source Initiative (OSI) organization]].  For licensing questions, please contact us at [mailto:projects@owasp.org projects@owasp.org].&lt;br /&gt;
&lt;br /&gt;
In an effort to help OWASP Project leaders choose the appropriate license for their project, the Global Project Committee recommends the following open source licenses.  Understand that these licenses are only recommendations and Project Leaders are welcome to use any [[http://opensource.org/licenses/category Open Source Initiative (OSI) organization]] approved license they wish.&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Contributor License Agreements==&lt;br /&gt;
&lt;br /&gt;
OWASP desires that all contributors of ideas, code, or documentation to the OWASP projects complete, sign, and submit (via snailmail or fax) a [[Contributor License Agreement]]. The purpose of this agreement is to clearly define the terms under which intellectual property has been contributed to OWASP and thereby allow us to defend the project should there be a legal dispute regarding the software at some future time. All contributions made through the website are covered by the clickthrough license on the account creation page.&lt;br /&gt;
&lt;br /&gt;
==Assignment of Copyright Agreement==&lt;br /&gt;
&lt;br /&gt;
In the case that the contributor desire to assign copyright to the OWASP Foundation, please use the [[Assignment of Copyright Agreement]].  Assignment of copyright is not strictly necessary but is an option available to those contributors who would prefer that the OWASP Foundation hold the copyright for contributed materials.&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Licenses&amp;diff=141086</id>
		<title>OWASP Licenses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Licenses&amp;diff=141086"/>
				<updated>2012-12-12T17:55:01Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP and Licensing'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation uses several licenses to distribute software, documentation, and other materials. Contact us for agreements concerning acceptance of materials from individuals and corporations, such as existing documents or software projects. These licenses help us ensure that OWASP projects are supported longterm, and the materials produced can be easily used and are free and open to everyone.&lt;br /&gt;
&lt;br /&gt;
==Use of the OWASP Brand==&lt;br /&gt;
&lt;br /&gt;
The use of the OWASP Brand is covered by the [[OWASP brand usage rules]].&lt;br /&gt;
&lt;br /&gt;
==Licensing of OWASP Website Content==&lt;br /&gt;
&lt;br /&gt;
We welcome the use of OWASP website content.  If you would like to use anything from the wiki in another work, you must follow the terms of the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution ShareAlike 3.0 license (CC-BY-SA)]. We strongly encourage organizations to use OWASP materials for their internal purposes.  If you want to distribute modified OWASP materials externally, you must make them available under the CC-BY-SA license - preferably by making your improvements directly at OWASP.  Thanks!&lt;br /&gt;
&lt;br /&gt;
==Licensing of OWASP Projects==&lt;br /&gt;
&lt;br /&gt;
All software, documentation, and other materials produced by The OWASP Foundation or any OWASP Project is licensed according to an open source license as defined by the [[http://opensource.org/licenses/category Open Source Initiative (OSI) organization]].  For licensing questions, please contact us at [mailto:projects@owasp.org projects@owasp.org].&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
In an effort to help OWASP Project leaders choose the appropriate license for their project, the Global Project Committee recommends the following open source licenses.  Understand that these licenses are only recommendations and Project Leaders are welcome to use any [[http://opensource.org/licenses/category Open Source Initiative (OSI) organization]] approved license they wish.&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Contributor License Agreements==&lt;br /&gt;
&lt;br /&gt;
OWASP desires that all contributors of ideas, code, or documentation to the OWASP projects complete, sign, and submit (via snailmail or fax) a [[Contributor License Agreement]]. The purpose of this agreement is to clearly define the terms under which intellectual property has been contributed to OWASP and thereby allow us to defend the project should there be a legal dispute regarding the software at some future time. All contributions made through the website are covered by the clickthrough license on the account creation page.&lt;br /&gt;
&lt;br /&gt;
==Assignment of Copyright Agreement==&lt;br /&gt;
&lt;br /&gt;
In the case that the contributor desire to assign copyright to the OWASP Foundation, please use the [[Assignment of Copyright Agreement]].  Assignment of copyright is not strictly necessary but is an option available to those contributors who would prefer that the OWASP Foundation hold the copyright for contributed materials.&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_Licenses&amp;diff=141085</id>
		<title>OWASP Licenses</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_Licenses&amp;diff=141085"/>
				<updated>2012-12-12T17:52:17Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP and Licensing'''&lt;br /&gt;
&lt;br /&gt;
The OWASP Foundation uses several licenses to distribute software, documentation, and other materials. Contact us for agreements concerning acceptance of materials from individuals and corporations, such as existing documents or software projects. These licenses help us ensure that OWASP projects are supported longterm, and the materials produced can be easily used and are free and open to everyone.&lt;br /&gt;
&lt;br /&gt;
==Use of the OWASP Brand==&lt;br /&gt;
&lt;br /&gt;
The use of the OWASP Brand is covered by the [[OWASP brand usage rules]].&lt;br /&gt;
&lt;br /&gt;
==Licensing of OWASP Website Content==&lt;br /&gt;
&lt;br /&gt;
We welcome the use of OWASP website content.  If you would like to use anything from the wiki in another work, you must follow the terms of the [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution ShareAlike 3.0 license (CC-BY-SA)]. We strongly encourage organizations to use OWASP materials for their internal purposes.  If you want to distribute modified OWASP materials externally, you must make them available under the CC-BY-SA license - preferably by making your improvements directly at OWASP.  Thanks!&lt;br /&gt;
&lt;br /&gt;
==Licensing of OWASP Projects==&lt;br /&gt;
&lt;br /&gt;
All software, documentation, and other materials produced by The OWASP Foundation or any OWASP Project is licensed according to an open source license as defined by the [[http://opensource.org/licenses/category Open Source Initiative (OSI) organization]].  For licensing questions, please contact us at [mailto:owasp@owasp.org owasp@owasp.org].&lt;br /&gt;
&lt;br /&gt;
==OWASP	Recommended Licenses==&lt;br /&gt;
&lt;br /&gt;
In an effort to help OWASP Project leaders choose the appropriate license for their project, the Global Project Committee recommends the following open source licenses.  Understand that these licenses are only recommendations and Project Leaders are welcome to use any [[http://opensource.org/licenses/category Open Source Initiative (OSI) organization]] approved license they wish.&lt;br /&gt;
&lt;br /&gt;
{{Recommended_Licenses}}&lt;br /&gt;
&lt;br /&gt;
==Contributor License Agreements==&lt;br /&gt;
&lt;br /&gt;
OWASP desires that all contributors of ideas, code, or documentation to the OWASP projects complete, sign, and submit (via snailmail or fax) a [[Contributor License Agreement]]. The purpose of this agreement is to clearly define the terms under which intellectual property has been contributed to OWASP and thereby allow us to defend the project should there be a legal dispute regarding the software at some future time. All contributions made through the website are covered by the clickthrough license on the account creation page.&lt;br /&gt;
&lt;br /&gt;
==Assignment of Copyright Agreement==&lt;br /&gt;
&lt;br /&gt;
In the case that the contributor desire to assign copyright to the OWASP Foundation, please use the [[Assignment of Copyright Agreement]].  Assignment of copyright is not strictly necessary but is an option available to those contributors who would prefer that the OWASP Foundation hold the copyright for contributed materials.&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_13&amp;diff=128314</id>
		<title>Global Conferences Committee - Application 13</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Global_Conferences_Committee_-_Application_13&amp;diff=128314"/>
				<updated>2012-04-21T04:35:15Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[How to Join a Committee|Click here to return to 'How to Join a Committee' page]]&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;2&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE APPLICATION FORM''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;|'''Applicant's Name'''&lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;Benny Ketelslegers.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Current and past OWASP Roles''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|OWASP Japan Chapter leader.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:25%; background:#7B8ABD&amp;quot; align=&amp;quot;center&amp;quot;| '''Committee Applying for''' &lt;br /&gt;
 | colspan=&amp;quot;1&amp;quot; style=&amp;quot;width:85%; background:#cccccc&amp;quot; align=&amp;quot;left&amp;quot;|Global Conferences Committee&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;br /&gt;
Some thoughts and the things I would like to do/achieve in the GCC: &lt;br /&gt;
&lt;br /&gt;
I have been a passive member as part of the Belgian OWASP chapter since 2007 and picked up the role of chapter leader in Japan end of 2011 after encouragement of some other OWASP leaders. I'm a founding member and was co-organizer of the not-for-profit BruCON conference which was well received and today with 400+ attendees has a fairly good and positive reputation in the community. I believe I can leverage this experience and advise other people organizing any OWASP conference and event. I want to especially focus on supporting events in the APAC region as well as within Japan. I want to improve collaboration between the different chapters and organizers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
Please be aware that for an application to be considered by the board, '''you MUST have 5 recommendations'''.  &lt;br /&gt;
An incomplete application will not be considered for vote.&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
{| style=&amp;quot;width:100%&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;center&amp;quot;&lt;br /&gt;
 ! colspan=&amp;quot;8&amp;quot; align=&amp;quot;center&amp;quot; style=&amp;quot;background:#4058A0; color:white&amp;quot;|&amp;lt;font color=&amp;quot;white&amp;quot;&amp;gt;'''COMMITTEE RECOMMENDATIONS''' &lt;br /&gt;
 |- &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:white; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Who Recommends/Name''' &lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Role in OWASP'''&lt;br /&gt;
 ! align=&amp;quot;center&amp;quot; style=&amp;quot;background:#7B8ABD; color:white&amp;quot;|&amp;lt;font color=&amp;quot;black&amp;quot;&amp;gt;'''Recommendation Content''' &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''1'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Kitisak Jirawannakool&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Thailand Chapter Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Benny is very active and his experience is a key success.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''2'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Christian Frichot&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Perth Australia Chapter Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Benny is well known within the security industry as providing a solid voice. His eagerness to represent the Asia Pacific region is something that I whole-heartedly support.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''3'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Sergei Belokamen&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|OWASP Melbourne Australia Chapter Leader&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Benny is well known within the security industry, his vast experience across all aspects of Information Security and ongoing dedication to success of OWASP across three continents would make him an asset to the OWASP organisation. I completely support Benny in his OWASP commitment. &lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''4'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Justin Searle&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|SLC,UT Chapter Board Member &amp;amp; GPC committee member&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|Having personally attended, spoken at, and provided training for BruCon, an annual large annual conference in Belgium which Benny started and organized, I can not recommend him high enough.  His conference was VERY well organized and I believe he would bring a lot of conference managment experience to OWASP.&lt;br /&gt;
 |-&lt;br /&gt;
 | style=&amp;quot;width:3%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|'''5'''&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:20%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 | style=&amp;quot;width:57%; background:#cccccc&amp;quot; align=&amp;quot;center&amp;quot;|&lt;br /&gt;
 |}&lt;br /&gt;
----&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123349</id>
		<title>Salt Lake City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123349"/>
				<updated>2012-01-27T03:41:21Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Salt_Lake|extra=&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
'''The chapter leader is [mailto:dmitry.dessiatnikov@gmail.com Dmitry Dessiatnikov]'''&lt;br /&gt;
&lt;br /&gt;
'''Chapter Board Members: [mailto:justin.searle@owasp.org Justin Searle] and [mailto:hoverchops@gmail.com Cameron Tovey]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Salt Lake&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Salt_Lake|emailarchives=http://lists.owasp.org/pipermail/owasp-Salt_Lake}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ''The next OWASP Utah Chapter meeting is scheduled for Thursday November 17, 2011'' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Date:'''''&lt;br /&gt;
&lt;br /&gt;
'''Thursday November 17, 2011'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Time:'''''&lt;br /&gt;
&lt;br /&gt;
'''6 pm'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Meeting location:'''''&lt;br /&gt;
&lt;br /&gt;
'''Accuvant Office'''&lt;br /&gt;
&lt;br /&gt;
'''406 W South Jordan Pkwy, Suite 220'''&lt;br /&gt;
&lt;br /&gt;
'''South Jordan, UT  84095'''&lt;br /&gt;
&lt;br /&gt;
'''(It is easiest to park on the back side of the building and enter on the 2nd floor.  The office is just inside the main doors.)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Presentation:'''''&lt;br /&gt;
&lt;br /&gt;
'''''&amp;quot;Passfault for better passwords&amp;quot;'''''&lt;br /&gt;
&lt;br /&gt;
'''By Cameron Morris'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Synopsis:'''''&lt;br /&gt;
&lt;br /&gt;
'''Passfault is a new technique for password analysis and password policies.  It finds more weak passwords, yet allowing strong passwords that typical policies deny, challenging traditional advise.  We'll discuss how it works, why it's better, and how you can help. More info: http://passfault.com'''&lt;br /&gt;
&lt;br /&gt;
'''Everyone is welcome to join us at our chapter meetings'''&lt;br /&gt;
[[Category:Utah]]&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123348</id>
		<title>Salt Lake City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123348"/>
				<updated>2012-01-27T03:41:11Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Salt_Lake|extra=&lt;br /&gt;
&lt;br /&gt;
'''The chapter leader is [mailto:dmitry.dessiatnikov@gmail.com Dmitry Dessiatnikov]'''&lt;br /&gt;
&lt;br /&gt;
'''Chapter Board Members: [mailto:justin.searle@owasp.org Justin Searle] and [mailto:hoverchops@gmail.com Cameron Tovey]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Salt Lake&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Salt_Lake|emailarchives=http://lists.owasp.org/pipermail/owasp-Salt_Lake}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ''The next OWASP Utah Chapter meeting is scheduled for Thursday November 17, 2011'' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Date:'''''&lt;br /&gt;
&lt;br /&gt;
'''Thursday November 17, 2011'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Time:'''''&lt;br /&gt;
&lt;br /&gt;
'''6 pm'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Meeting location:'''''&lt;br /&gt;
&lt;br /&gt;
'''Accuvant Office'''&lt;br /&gt;
&lt;br /&gt;
'''406 W South Jordan Pkwy, Suite 220'''&lt;br /&gt;
&lt;br /&gt;
'''South Jordan, UT  84095'''&lt;br /&gt;
&lt;br /&gt;
'''(It is easiest to park on the back side of the building and enter on the 2nd floor.  The office is just inside the main doors.)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Presentation:'''''&lt;br /&gt;
&lt;br /&gt;
'''''&amp;quot;Passfault for better passwords&amp;quot;'''''&lt;br /&gt;
&lt;br /&gt;
'''By Cameron Morris'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Synopsis:'''''&lt;br /&gt;
&lt;br /&gt;
'''Passfault is a new technique for password analysis and password policies.  It finds more weak passwords, yet allowing strong passwords that typical policies deny, challenging traditional advise.  We'll discuss how it works, why it's better, and how you can help. More info: http://passfault.com'''&lt;br /&gt;
&lt;br /&gt;
'''Everyone is welcome to join us at our chapter meetings'''&lt;br /&gt;
[[Category:Utah]]&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123347</id>
		<title>Salt Lake City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123347"/>
				<updated>2012-01-27T03:40:47Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Salt_Lake|&lt;br /&gt;
&lt;br /&gt;
'''The chapter leader is [mailto:dmitry.dessiatnikov@gmail.com Dmitry Dessiatnikov]'''&lt;br /&gt;
&lt;br /&gt;
'''Chapter Board Members: [mailto:justin.searle@owasp.org Justin Searle] and [mailto:hoverchops@gmail.com Cameron Tovey]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Salt Lake&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Salt_Lake|emailarchives=http://lists.owasp.org/pipermail/owasp-Salt_Lake}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ''The next OWASP Utah Chapter meeting is scheduled for Thursday November 17, 2011'' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Date:'''''&lt;br /&gt;
&lt;br /&gt;
'''Thursday November 17, 2011'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Time:'''''&lt;br /&gt;
&lt;br /&gt;
'''6 pm'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Meeting location:'''''&lt;br /&gt;
&lt;br /&gt;
'''Accuvant Office'''&lt;br /&gt;
&lt;br /&gt;
'''406 W South Jordan Pkwy, Suite 220'''&lt;br /&gt;
&lt;br /&gt;
'''South Jordan, UT  84095'''&lt;br /&gt;
&lt;br /&gt;
'''(It is easiest to park on the back side of the building and enter on the 2nd floor.  The office is just inside the main doors.)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Presentation:'''''&lt;br /&gt;
&lt;br /&gt;
'''''&amp;quot;Passfault for better passwords&amp;quot;'''''&lt;br /&gt;
&lt;br /&gt;
'''By Cameron Morris'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Synopsis:'''''&lt;br /&gt;
&lt;br /&gt;
'''Passfault is a new technique for password analysis and password policies.  It finds more weak passwords, yet allowing strong passwords that typical policies deny, challenging traditional advise.  We'll discuss how it works, why it's better, and how you can help. More info: http://passfault.com'''&lt;br /&gt;
&lt;br /&gt;
'''Everyone is welcome to join us at our chapter meetings'''&lt;br /&gt;
[[Category:Utah]]&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123346</id>
		<title>Salt Lake City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123346"/>
				<updated>2012-01-27T03:39:50Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Salt_Lake&lt;br /&gt;
&lt;br /&gt;
'''The chapter leader is [mailto:dmitry.dessiatnikov@gmail.com Dmitry Dessiatnikov]'''&lt;br /&gt;
&lt;br /&gt;
'''Chapter Board Members: [mailto:justin.searle@owasp.org Justin Searle] and [mailto:hoverchops@gmail.com Cameron Tovey]'''&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Salt Lake&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Salt_Lake|emailarchives=http://lists.owasp.org/pipermail/owasp-Salt_Lake}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ''The next OWASP Utah Chapter meeting is scheduled for Thursday November 17, 2011'' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Date:'''''&lt;br /&gt;
&lt;br /&gt;
'''Thursday November 17, 2011'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Time:'''''&lt;br /&gt;
&lt;br /&gt;
'''6 pm'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Meeting location:'''''&lt;br /&gt;
&lt;br /&gt;
'''Accuvant Office'''&lt;br /&gt;
&lt;br /&gt;
'''406 W South Jordan Pkwy, Suite 220'''&lt;br /&gt;
&lt;br /&gt;
'''South Jordan, UT  84095'''&lt;br /&gt;
&lt;br /&gt;
'''(It is easiest to park on the back side of the building and enter on the 2nd floor.  The office is just inside the main doors.)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Presentation:'''''&lt;br /&gt;
&lt;br /&gt;
'''''&amp;quot;Passfault for better passwords&amp;quot;'''''&lt;br /&gt;
&lt;br /&gt;
'''By Cameron Morris'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Synopsis:'''''&lt;br /&gt;
&lt;br /&gt;
'''Passfault is a new technique for password analysis and password policies.  It finds more weak passwords, yet allowing strong passwords that typical policies deny, challenging traditional advise.  We'll discuss how it works, why it's better, and how you can help. More info: http://passfault.com'''&lt;br /&gt;
&lt;br /&gt;
'''Everyone is welcome to join us at our chapter meetings'''&lt;br /&gt;
[[Category:Utah]]&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123345</id>
		<title>Salt Lake City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123345"/>
				<updated>2012-01-27T03:38:48Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Salt_Lake|extra=The chapter leader is [mailto:dmitry.dessiatnikov@gmail.com Dmitry Dessiatnikov]&lt;br /&gt;
&lt;br /&gt;
Chapter Board Members: [mailto:justin.searle@owasp.org Justin Searle] and [hoverchops@gmail.com Cameron Tovey]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Salt Lake&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Salt_Lake|emailarchives=http://lists.owasp.org/pipermail/owasp-Salt_Lake}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ''The next OWASP Utah Chapter meeting is scheduled for Thursday November 17, 2011'' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Date:'''''&lt;br /&gt;
&lt;br /&gt;
'''Thursday November 17, 2011'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Time:'''''&lt;br /&gt;
&lt;br /&gt;
'''6 pm'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Meeting location:'''''&lt;br /&gt;
&lt;br /&gt;
'''Accuvant Office'''&lt;br /&gt;
&lt;br /&gt;
'''406 W South Jordan Pkwy, Suite 220'''&lt;br /&gt;
&lt;br /&gt;
'''South Jordan, UT  84095'''&lt;br /&gt;
&lt;br /&gt;
'''(It is easiest to park on the back side of the building and enter on the 2nd floor.  The office is just inside the main doors.)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Presentation:'''''&lt;br /&gt;
&lt;br /&gt;
'''''&amp;quot;Passfault for better passwords&amp;quot;'''''&lt;br /&gt;
&lt;br /&gt;
'''By Cameron Morris'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Synopsis:'''''&lt;br /&gt;
&lt;br /&gt;
'''Passfault is a new technique for password analysis and password policies.  It finds more weak passwords, yet allowing strong passwords that typical policies deny, challenging traditional advise.  We'll discuss how it works, why it's better, and how you can help. More info: http://passfault.com'''&lt;br /&gt;
&lt;br /&gt;
'''Everyone is welcome to join us at our chapter meetings'''&lt;br /&gt;
[[Category:Utah]]&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123344</id>
		<title>Salt Lake City</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Salt_Lake_City&amp;diff=123344"/>
				<updated>2012-01-27T03:37:06Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Salt_Lake|extra=The chapter leader is [mailto:dmitry.dessiatnikov@gmail.com Dmitry Dessiatnikov]&lt;br /&gt;
&lt;br /&gt;
Chapter Board: Justin Searle and Cameron Tovey&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Salt Lake&amp;lt;/paypal&amp;gt;&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-Salt_Lake|emailarchives=http://lists.owasp.org/pipermail/owasp-Salt_Lake}}&lt;br /&gt;
&lt;br /&gt;
== Local News ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== ''The next OWASP Utah Chapter meeting is scheduled for Thursday November 17, 2011'' ==&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Date:'''''&lt;br /&gt;
&lt;br /&gt;
'''Thursday November 17, 2011'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Time:'''''&lt;br /&gt;
&lt;br /&gt;
'''6 pm'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Meeting location:'''''&lt;br /&gt;
&lt;br /&gt;
'''Accuvant Office'''&lt;br /&gt;
&lt;br /&gt;
'''406 W South Jordan Pkwy, Suite 220'''&lt;br /&gt;
&lt;br /&gt;
'''South Jordan, UT  84095'''&lt;br /&gt;
&lt;br /&gt;
'''(It is easiest to park on the back side of the building and enter on the 2nd floor.  The office is just inside the main doors.)'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Presentation:'''''&lt;br /&gt;
&lt;br /&gt;
'''''&amp;quot;Passfault for better passwords&amp;quot;'''''&lt;br /&gt;
&lt;br /&gt;
'''By Cameron Morris'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''''Synopsis:'''''&lt;br /&gt;
&lt;br /&gt;
'''Passfault is a new technique for password analysis and password policies.  It finds more weak passwords, yet allowing strong passwords that typical policies deny, challenging traditional advise.  We'll discuss how it works, why it's better, and how you can help. More info: http://passfault.com'''&lt;br /&gt;
&lt;br /&gt;
'''Everyone is welcome to join us at our chapter meetings'''&lt;br /&gt;
[[Category:Utah]]&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Training/Assessing_and_Exploiting_Web_Applications_with_Samurai-WTF&amp;diff=123270</id>
		<title>OWASP AppSec DC 2012/Training/Assessing and Exploiting Web Applications with Samurai-WTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Training/Assessing_and_Exploiting_Web_Applications_with_Samurai-WTF&amp;diff=123270"/>
				<updated>2012-01-26T04:13:15Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
{{:OWASP AppSec DC 2012 Header}}&lt;br /&gt;
==Description==&lt;br /&gt;
'''Course Length: 2 Day'''&lt;br /&gt;
&lt;br /&gt;
Come take the official Samurai-WTF training course given by the two founders and lead developers of the project! You will learn the latest Samurai-WTF open source tools and as well as the latest techniques to perform web application penetration tests. After a quick overview of pen testing methodology, the instructors will lead you through the penetration and exploitation of various web applications, including client side attacks using flaws within the application. Different sets of open source tools will be used on each web application, allowing you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a capture the flag event. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence and knowledge necessary to perform web application assessments and expose you to the wealth of freely available, open source tools. &lt;br /&gt;
&lt;br /&gt;
==Student Requirements==&lt;br /&gt;
&lt;br /&gt;
# Laptop with a functional DVD drive&lt;br /&gt;
# Latest VMware Player, VMware Workstation, or VMware Fusion installed&lt;br /&gt;
# Ability to disable all security software on their laptop such as Antivirus and/or firewalls&lt;br /&gt;
# Four (4) GB of hard drive space &lt;br /&gt;
# At least two (2) GB of RAM&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
Audience: Management, Technical, Operations &amp;lt;br&amp;gt;&lt;br /&gt;
Skill Level: Basic to Intermediate&lt;br /&gt;
&lt;br /&gt;
# Attendees will be able to explain the steps and methodology used in performing web application assessments and penetration tests.&lt;br /&gt;
# Attendees will be able to use the open source tools on the Samurai-WTF CD to discover and identify vulnerabilities in web applications.&lt;br /&gt;
# Attendees will be able to exploit several client-side and server-side vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Instructor==&lt;br /&gt;
&lt;br /&gt;
Justin Searle &amp;amp; Kevin Johnson&lt;br /&gt;
&lt;br /&gt;
Justin is a Managing Partner of UtiliSec, specializing in Smart Grid security architecture design and penetration testing.  Justin led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and currently plays key roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).  Justin has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities, corporations, and security conferences, and is currently an instructor for the SANS Institute.  In addition to electric power industry conferences, Justin frequently presents at top security conferences such as Black Hat, DEFCON, OWASP, and AusCERT.  Justin co-leads prominent open source projects including the Samurai Web Testing Framework, Middler, Yokoso!, and Laudanum.  Justin has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), and Web Application Penetration Tester (GWAPT).&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
[[Category:AppSec_DC_2012_Training]]&lt;br /&gt;
{{:OWASP AppSec DC 2012 Footer}}&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Training/Assessing_and_Exploiting_Web_Applications_with_Samurai-WTF&amp;diff=123269</id>
		<title>OWASP AppSec DC 2012/Training/Assessing and Exploiting Web Applications with Samurai-WTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Training/Assessing_and_Exploiting_Web_Applications_with_Samurai-WTF&amp;diff=123269"/>
				<updated>2012-01-26T04:12:52Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
{{:OWASP AppSec DC 2012 Header}}&lt;br /&gt;
==Description==&lt;br /&gt;
'''Course Length: 2 Day'''&lt;br /&gt;
&lt;br /&gt;
Come take the official Samurai-WTF training course given by the two founders and lead developers of the project! You will learn the latest Samurai-WTF open source tools and as well as the latest techniques to perform web application penetration tests. After a quick overview of pen testing methodology, the instructors will lead you through the penetration and exploitation of various web applications, including client side attacks using flaws within the application. Different sets of open source tools will be used on each web application, allowing you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a capture the flag event. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence and knowledge necessary to perform web application assessments and expose you to the wealth of freely available, open source tools. &lt;br /&gt;
&lt;br /&gt;
==Student Requirements==&lt;br /&gt;
&lt;br /&gt;
# Laptop with a functional DVD drive&lt;br /&gt;
# Latest VMware Player, VMware Workstation, or VMware Fusion installed&lt;br /&gt;
# Ability to disable all security software on their laptop such as Antivirus and/or firewalls&lt;br /&gt;
# Four (4) GB of hard drive space &lt;br /&gt;
# At least two (2) GB of RAM&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
&lt;br /&gt;
Audience: Management, Technical, Operations&lt;br /&gt;
Skill Level: Basic to Intermediate&lt;br /&gt;
&lt;br /&gt;
# Attendees will be able to explain the steps and methodology used in performing web application assessments and penetration tests.&lt;br /&gt;
# Attendees will be able to use the open source tools on the Samurai-WTF CD to discover and identify vulnerabilities in web applications.&lt;br /&gt;
# Attendees will be able to exploit several client-side and server-side vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Instructor==&lt;br /&gt;
&lt;br /&gt;
Justin Searle &amp;amp; Kevin Johnson&lt;br /&gt;
&lt;br /&gt;
Justin is a Managing Partner of UtiliSec, specializing in Smart Grid security architecture design and penetration testing.  Justin led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and currently plays key roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).  Justin has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities, corporations, and security conferences, and is currently an instructor for the SANS Institute.  In addition to electric power industry conferences, Justin frequently presents at top security conferences such as Black Hat, DEFCON, OWASP, and AusCERT.  Justin co-leads prominent open source projects including the Samurai Web Testing Framework, Middler, Yokoso!, and Laudanum.  Justin has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), and Web Application Penetration Tester (GWAPT).&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
[[Category:AppSec_DC_2012_Training]]&lt;br /&gt;
{{:OWASP AppSec DC 2012 Footer}}&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Training/Assessing_and_Exploiting_Web_Applications_with_Samurai-WTF&amp;diff=123268</id>
		<title>OWASP AppSec DC 2012/Training/Assessing and Exploiting Web Applications with Samurai-WTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Training/Assessing_and_Exploiting_Web_Applications_with_Samurai-WTF&amp;diff=123268"/>
				<updated>2012-01-26T04:12:24Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
{{:OWASP AppSec DC 2012 Header}}&lt;br /&gt;
==Description==&lt;br /&gt;
'''Course Length: 2 Day'''&lt;br /&gt;
&lt;br /&gt;
Come take the official Samurai-WTF training course given by the two founders and lead developers of the project! You will learn the latest Samurai-WTF open source tools and as well as the latest techniques to perform web application penetration tests. After a quick overview of pen testing methodology, the instructors will lead you through the penetration and exploitation of various web applications, including client side attacks using flaws within the application. Different sets of open source tools will be used on each web application, allowing you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a capture the flag event. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence and knowledge necessary to perform web application assessments and expose you to the wealth of freely available, open source tools. &lt;br /&gt;
&lt;br /&gt;
==Student Requirements==&lt;br /&gt;
&lt;br /&gt;
# Laptop with a functional DVD drive&lt;br /&gt;
# Latest VMware Player, VMware Workstation, or VMware Fusion installed&lt;br /&gt;
# Ability to disable all security software on their laptop such as Antivirus and/or firewalls&lt;br /&gt;
# Four (4) GB of hard drive space &lt;br /&gt;
# At least two (2) GB of RAM&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
Audience: Management, Technical, Operations&lt;br /&gt;
Skill Level: Basic to Intermediate&lt;br /&gt;
&lt;br /&gt;
1.	Attendees will be able to explain the steps and methodology used in performing web application assessments and penetration tests.&amp;lt;br&amp;gt;2.	Attendees will be able to use the open source tools on the Samurai-WTF CD to discover and identify vulnerabilities in web applications.&amp;lt;br&amp;gt;3.	Attendees will be able to exploit several client-side and server-side vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Instructor==&lt;br /&gt;
&lt;br /&gt;
Justin Searle &amp;amp; Kevin Johnson&lt;br /&gt;
&lt;br /&gt;
Justin is a Managing Partner of UtiliSec, specializing in Smart Grid security architecture design and penetration testing.  Justin led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and currently plays key roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).  Justin has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities, corporations, and security conferences, and is currently an instructor for the SANS Institute.  In addition to electric power industry conferences, Justin frequently presents at top security conferences such as Black Hat, DEFCON, OWASP, and AusCERT.  Justin co-leads prominent open source projects including the Samurai Web Testing Framework, Middler, Yokoso!, and Laudanum.  Justin has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), and Web Application Penetration Tester (GWAPT).&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
[[Category:AppSec_DC_2012_Training]]&lt;br /&gt;
{{:OWASP AppSec DC 2012 Footer}}&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Training/Assessing_and_Exploiting_Web_Applications_with_Samurai-WTF&amp;diff=123267</id>
		<title>OWASP AppSec DC 2012/Training/Assessing and Exploiting Web Applications with Samurai-WTF</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=OWASP_AppSec_DC_2012/Training/Assessing_and_Exploiting_Web_Applications_with_Samurai-WTF&amp;diff=123267"/>
				<updated>2012-01-26T04:07:46Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
{{:OWASP AppSec DC 2012 Header}}&lt;br /&gt;
==Description==&lt;br /&gt;
'''Course Length: 2 Day'''&lt;br /&gt;
&lt;br /&gt;
Come take the official Samurai-WTF training course given by the two founders and lead developers of the project! You will learn the latest Samurai-WTF open source tools and as well as the latest techniques to perform web application penetration tests. After a quick overview of pen testing methodology, the instructors will lead you through the penetration and exploitation of various web applications, including client side attacks using flaws within the application. Different sets of open source tools will be used on each web application, allowing you to learn first hand the pros and cons of each tool. After you have gained experience with the Samurai-WTF tools, you will be challenged with a capture the flag event. This final challenge will give you time to practice your new skills at your own pace and experiment with your favorite new tools. This experience will help you gain the confidence and knowledge necessary to perform web application assessments and expose you to the wealth of freely available, open source tools. &lt;br /&gt;
==Student Requirements==&lt;br /&gt;
Laptop Required: &lt;br /&gt;
Students Need to Bring:&lt;br /&gt;
Nerf guns, assuming they make their return this year.  ;-)&lt;br /&gt;
&lt;br /&gt;
==Objectives==&lt;br /&gt;
Audience: Management, Technical, Operations&lt;br /&gt;
Skill Level: Basic&lt;br /&gt;
&lt;br /&gt;
1.	Attendees will be able to explain the steps and methodology used in performing web application assessments and penetration tests.&amp;lt;br&amp;gt;2.	Attendees will be able to use the open source tools on the Samurai-WTF CD to discover and identify vulnerabilities in web applications.&amp;lt;br&amp;gt;3.	Attendees will be able to exploit several client-side and server-side vulnerabilities.&amp;lt;br&amp;gt;&lt;br /&gt;
==Instructor==&lt;br /&gt;
Justin Searle &amp;amp; Kevin Johnson&lt;br /&gt;
&lt;br /&gt;
Justin is a Managing Partner of UtiliSec, specializing in Smart Grid security architecture design and penetration testing.  Justin led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628 and currently plays key roles in the Advanced Security Acceleration Project for the Smart Grid (ASAP-SG), National Electric Sector Cybersecurity Organization Resources (NESCOR), and Smart Grid Interoperability Panel (SGIP).  Justin has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities, corporations, and security conferences, and is currently an instructor for the SANS Institute.  In addition to electric power industry conferences, Justin frequently presents at top security conferences such as Black Hat, DEFCON, OWASP, and AusCERT.  Justin co-leads prominent open source projects including the Samurai Web Testing Framework, Middler, Yokoso!, and Laudanum.  Justin has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), and Web Application Penetration Tester (GWAPT).&lt;br /&gt;
&lt;br /&gt;
Kevin Johnson is a security consultant with Secure Ideas. Kevin came to security from a development and system administration background. He has many years of experience performing security services for fortune 100 companies, and in his spare time he contributes to a large number of open source security projects. Kevin's involvement in open-source projects is spread across a number of projects and efforts. He is the founder of many different projects and has worked on others. He founded BASE, which is a Web front-end for Snort analysis. He also founded and continues to lead the SamuraiWTF live DVD. This is a live environment focused on Web penetration testing. He also founded Yokoso and Laudanum, which are focused on exploit delivery. Kevin is a senior instructor for SANS and the author of Security 542: Web Application Penetration Testing and Ethical Hacking. He also presents at industry events, including DEFCON and ShmooCon, and for various organizations, like Infragard, ISACA, ISSA, and the University of Florida.&lt;br /&gt;
&lt;br /&gt;
[[Category:AppSec_DC_2012_Training]]&lt;br /&gt;
{{:OWASP AppSec DC 2012 Footer}}&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=User:Justin_Searle&amp;diff=104894</id>
		<title>User:Justin Searle</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=User:Justin_Searle&amp;diff=104894"/>
				<updated>2011-02-11T03:12:30Z</updated>
		
		<summary type="html">&lt;p&gt;Justin Searle: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Justin Searle is a member of the OWASP Global Project Committee and a Senior Security Analyst with [http://www.inguardians.com InGuardians], specializing in the penetration testing of web applications, networks, and embedded devices, especially those pertaining to the Smart Grid.  Justin is an active member of ASAP-SG (Advanced Security Acceleration Project for the Smart Grid) and led the Smart Grid Security Architecture group in the creation of NIST Interagency Report 7628.  Previously, Justin served as JetBlue Airway’s IT Security Architect, and has taught courses in hacking techniques, forensics, networking, and intrusion detection for multiple universities and corporations.  Justin has presented at top security conferences including DEFCON, ToorCon, ShmooCon, and SANS.  Justin co-leads prominent open source projects including the [http://samurai.inguardians.com Samurai Web Testing Framework], Middler, Yokoso!, and Laudnum.  Justin has an MBA in International Technology and is a CISSP and SANS GIAC certified Incident Handler (GCIH), Intrusion Analyst (GCIA), and Web Application Penetration Tester (GWAPT).&lt;br /&gt;
&lt;br /&gt;
Facebook:  http://www.facebook.com/people/Justin-Searle/1533095958&lt;br /&gt;
&lt;br /&gt;
LinkedIn:  http://www.linkedin.com/in/meeas&lt;br /&gt;
&lt;br /&gt;
Twitter:  http://twitter.com/meeas&lt;/div&gt;</summary>
		<author><name>Justin Searle</name></author>	</entry>

	</feed>