<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Koussa</id>
		<title>OWASP - User contributions [en]</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Koussa"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php/Special:Contributions/Koussa"/>
		<updated>2026-04-16T02:49:43Z</updated>
		<subtitle>User contributions</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=255590</id>
		<title>Source Code Analysis Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=255590"/>
				<updated>2019-10-21T19:13:35Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;[[Static_Code_Analysis | Source code analysis]] tools, also referred to as Static Application Security Testing (SAST) Tools, are designed to analyze source code and/or compiled versions of code to help find security flaws. &lt;br /&gt;
&lt;br /&gt;
Some tools are starting to move into the IDE. For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development life cycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful, especially when compared to finding vulnerabilities much later in the development cycle.&lt;br /&gt;
&lt;br /&gt;
== Strengths and Weaknesses ==&lt;br /&gt;
&lt;br /&gt;
=== Strengths ===&lt;br /&gt;
&lt;br /&gt;
* Scales well -- can be run on lots of software, and can be run repeatedly (as with nightly builds or continuous integration)&lt;br /&gt;
* Useful for things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, and so forth&lt;br /&gt;
* Output is good for developers -- highlights the precise source files, line numbers, and even subsections of lines that are affected&lt;br /&gt;
&lt;br /&gt;
=== Weaknesses ===&lt;br /&gt;
&lt;br /&gt;
* Many types of security vulnerabilities are difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. However, tools of this type are getting better.&lt;br /&gt;
* High numbers of false positives.&lt;br /&gt;
* Frequently can't find configuration issues, since they are not represented in the code.&lt;br /&gt;
* Difficult to 'prove' that an identified security issue is an actual vulnerability.&lt;br /&gt;
* Many of these tools have difficulty analyzing code that can't be compiled. Analysts frequently can't compile code because they don't have the right libraries, all the compilation instructions, all the code, etc.&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Requirement: Must support your programming language, but not usually a key factor once it does.&lt;br /&gt;
* Types of vulnerabilities it can detect (out of the [[OWASP Top Ten]]?) (plus more?)&lt;br /&gt;
* How accurate is it? False Positive/False Negative rates?&lt;br /&gt;
** Does the tool have an OWASP [[Benchmark]] score?&lt;br /&gt;
* Does it understand the libraries/frameworks you use?&lt;br /&gt;
* Does it require a fully buildable set of source?&lt;br /&gt;
* Can it run against binaries instead of source?&lt;br /&gt;
* Can it be integrated into the developer's IDE?&lt;br /&gt;
* How hard is it to setup/use?&lt;br /&gt;
* Can it be run continuously and automatically?&lt;br /&gt;
* License cost for the tool. (Some are sold per user, per org, per app, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)&lt;br /&gt;
&lt;br /&gt;
==OWASP Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP SonarQube Project]]&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project OWASP Orizon Project]&lt;br /&gt;
* [[OWASP_LAPSE_Project | OWASP LAPSE Project]]&lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP WAP-Web Application Protection]]&lt;br /&gt;
&lt;br /&gt;
==Disclaimer==&lt;br /&gt;
&lt;br /&gt;
Disclaimer: &amp;lt;b&amp;gt;The tools listed in the tables below are presented in alphabetical order. &amp;lt;i&amp;gt;OWASP does not endorse any of the vendors or tools by listing them in the table below.&amp;lt;/i&amp;gt; We have made every effort to provide this information as accurately as possible. If you are the vendor of a tool below and think that this information is incomplete or incorrect, please send an e-mail to our mailing list and we will make every effort to correct this information.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Open Source or Free Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [https://wiki.openstack.org/wiki/Security/Projects/Bandit Bandit] - bandit is a comprehensive source vulnerability scanner for Python&lt;br /&gt;
* [http://brakemanscanner.org/ Brakeman] - Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications&lt;br /&gt;
* [http://rubygems.org/gems/codesake-dawn Codesake Dawn] - Codesake Dawn is an open source security source code analyzer designed for Sinatra, Padrino for Ruby on Rails applications. It also works on non-web applications written in Ruby&lt;br /&gt;
* [https://discotek.ca/deepdive.xhtml Deep Dive] - Byte code analysis tool for discovering vulnerabilities in Java deployments (Ear, War, Jar).&lt;br /&gt;
* [http://findbugs.sourceforge.net/ FindBugs] - (Legacy - NOT Maintained - Use SpotBugs (see below) instead) - Find bugs (including a few security flaws) in Java programs&lt;br /&gt;
* [https://find-sec-bugs.github.io/ FindSecBugs] - A security specific plugin for SpotBugs that significantly improves SpotBugs's ability to find security vulnerabilities in Java programs. Works with the old FindBugs too,&lt;br /&gt;
* [http://www.dwheeler.com/flawfinder/ Flawfinder] Flawfinder - Scans C and C++&lt;br /&gt;
* [https://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/ Google CodeSearchDiggity] - Uses Google Code Search to identifies vulnerabilities in open source code projects hosted by Google Code, MS CodePlex, SourceForge, Github, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, and much more.  ''Essentially, Google CodeSearchDiggity provides a source code security analysis of nearly every single open source code project in existence – simultaneously.''&lt;br /&gt;
* [https://github.com/wireghoul/graudit/ Graudit] - Scans multiple languages for various security flaws.&lt;br /&gt;
* [https://lgtm.com/help/lgtm/about-lgtm LGTM] - A free for open source static analysis service that automatically monitors commits to publicly accessible code in: Bitbucket Cloud, GitHub, or GitLab. Supports C/C++, C#, COBOL (in beta), Java, JavaScript/TypeScript, Python&lt;br /&gt;
* [https://dotnet-security-guard.github.io/ .NET Security Guard] - Roslyn analyzers that aim to help security audits on .NET applications. It will find SQL injections, LDAP injections, XXE, cryptography weakness, XSS and more.&lt;br /&gt;
* [https://github.com/FloeDesignTechnologies/phpcs-security-audit phpcs-security-audit] - phpcs-security-audit is a set of PHP_CodeSniffer rules that finds flaws or weaknesses related to security in PHP and its popular CMS or frameworks.  It currently has core PHP rules as well as Drupal 7 specific rules.&lt;br /&gt;
* [http://pmd.sourceforge.net/ PMD] - PMD scans Java source code and looks for potential code problems (this is a code quality tool that does not focus on security issues)&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/library/ms933794.aspx PreFast] (Microsoft) - PREfast is a static analysis tool that identifies defects in C/C++ programs. Last update 2006.&lt;br /&gt;
* [https://github.com/designsecurity/progpilot Progpilot] - Progpilot is a static analyzer tool for PHP that detects security vulnerabilities such as XSS and SQL Injection.&lt;br /&gt;
* [https://pumascan.com/ Puma Scan] - Puma Scan is a .NET C# open source static source code analyzer that runs as an IDE plugin for Visual Studio and via MSBuild in CI pipelines.&lt;br /&gt;
* [https://pyre-check.org/ Pyre] - A performant type-checker for Python 3, that also has [https://pyre-check.org/docs/static-analysis.html limited security/data flow analysis] capabilities.&lt;br /&gt;
* [http://rips-scanner.sourceforge.net/ RIPS] - RIPS Open Source is a static source code analyzer for vulnerabilities in PHP web applications. Please see notes on the sourceforge.net site.&lt;br /&gt;
* [https://discotek.ca/sinktank.xhtml Sink Tank] - Byte code static code analyzer for performing source/sink (taint) analysis.&lt;br /&gt;
* [http://www.sonarqube.org/ SonarQube] - Scans source code for more than 20 languages for Bugs, Vulnerabilities, and Code Smells. SonarQube IDE plugins for Eclipse, Visual Studio, and IntelliJ provided by [http://www.sonarlint.org/ SonarLint].&lt;br /&gt;
* [https://spotbugs.github.io/ SpotBugs] - This is the active fork replacement for FindBugs, which is not maintained anymore.&lt;br /&gt;
* [http://sourceforge.net/projects/visualcodegrepp/ VisualCodeGrepper (VCG)] - Scans C/C++, C#, VB, PHP, Java, and PL/SQL for security issues and for comments which may indicate defective code. The config files can be used to carry out additional checks for banned functions or functions which commonly cause security issues.&lt;br /&gt;
&lt;br /&gt;
[https://docs.gitlab.com/ee/user/application_security/sast/index.html#supported-languages-and-frameworks GitLab has lashed a free SAST tool for a bunch of different languages natively into GitLab. So you might be able to use that, or at least identify a free SAST tool for the language you need from that list].&lt;br /&gt;
&lt;br /&gt;
==Commercial Tools Of This Type==&lt;br /&gt;
* [https://www.ptsecurity.com/ww-en/products/ai/ Application Inspector] (Positive Technologies) - combines SAST, DAST, IAST, SCA, configuration analysis and other technologies, incl. unique abstract interpretation; has capability to generate test queries (exploits) to verify detected vulnerabilities during SAST analysis; Supported languages include: Java, C#, PHP, JavaScript, Objective C, VB.Net, PL/SQL, T-SQL, and others. &lt;br /&gt;
* [https://www.ibm.com/us-en/marketplace/application-security-on-cloud Application Security on Cloud] (IBM) - Provides SAST, DAST and mobile security testing as well as OpenSource library known vulnerability detection as a cloud service. &lt;br /&gt;
* [https://www.ibm.com/us-en/marketplace/ibm-appscan-source AppScan Source] (IBM)&lt;br /&gt;
* [https://www.blueclosure.com BlueClosure BC Detect] (BlueClosure) - Analyzes client-side JavaScript.&lt;br /&gt;
* [https://bugscout.io/en/ bugScout] (Nalbatech, Formally Buguroo)&lt;br /&gt;
* [https://www.castsoftware.com/products/application-intelligence-platform CAST AIP] (CAST) Performs static and architectural analysis to identify numerous types of security issues. Supports over 30 languages. [https://www.castsoftware.com/solutions/application-security/cwe#SupportedSecurityStandards AIP's security specific coverage is here].&lt;br /&gt;
* [https://www.codacy.com/ Codacy] Offers security patterns for languages such as Python, Ruby, Scala, Java, JavaScript and more. Integrates with tools such as Brakeman, Bandit, FindBugs, and others. (free for open source projects)&lt;br /&gt;
* [https://www.grammatech.com/products/codesonar CodeSonar] tool that supports C, C++, Java and C# and maps against the OWASP top 10 vulnerabilities.&lt;br /&gt;
* [https://www.contrastsecurity.com/interactive-application-security-testing-iast Contrast Assess] (Contrast Security) - Contrast performs code security without actually doing static analysis. Contrast does Interactive Application Security Testing (IAST), correlating runtime code &amp;amp; data analysis. It provides code level results without actually relying on static analysis.&lt;br /&gt;
* [http://www.coverity.com/products/code-advisor/ Coverity Code Advisor] (Synopsys)&lt;br /&gt;
* [https://www.checkmarx.com/technology/static-code-analysis-sca/ CxSAST] (Checkmarx)&lt;br /&gt;
* [https://www.microfocus.com/en-us/products/static-code-analysis-sast Fortify] (Micro Focus, Formally HP)&lt;br /&gt;
* [https://hdivsecurity.com/interactive-application-security-testing-iast Hdiv Detection] (Hdiv Security) - Hdiv performs code security without actually doing static analysis. Hdiv does Interactive Application Security Testing (IAST), correlating runtime code &amp;amp; data analysis. It provides code-level results without actually relying on static analysis.&lt;br /&gt;
* [http://www.juliasoft.com/solutions Julia] (JuliaSoft) - SaaS Java static analysis&lt;br /&gt;
* [http://www.klocwork.com/capabilities/static-code-analysis KlocWork] (KlocWork)&lt;br /&gt;
* [https://www.kiuwan.com/code-analysis/ Kiuwan] (an [http://www.optimyth.com Optimyth] company) - SaaS Software Quality &amp;amp; Security Analysis&lt;br /&gt;
* [http://www.parasoft.com/jsp/capabilities/static_analysis.jsp?itemId=547 Parasoft Test] (Parasoft)&lt;br /&gt;
* [https://pitss.com/products/pitss-con/ PITSS.CON] (PITTS)&lt;br /&gt;
* [https://www.ptsecurity.com/ww-en/products/ai/ PT Application Inspector] combines SAST, DAST, IAST, SCA, configuration analysis and other technologies, incl. unique abstract interpretation for high accuracy rate with minimum false positives; has a unique capability to generate special test queries (exploits) to verify detected vulnerabilities during SAST analysis; integrates with CI/CD, VCS, etc. PT AI helps to easily understand, verify, and fix flaws; has a simple UI; is highly automated and easy to use. Supported languages are Java, C#, PHP, JavaScript, Objective C, VB.Net, PL/SQL, T-SQL, and others.&lt;br /&gt;
* [https://pumascanpro.com/ Puma Scan Professional] - A .NET C# static source code analyzer that runs as a Visual Studio IDE extension, Azure DevOps extension, and Command Line (CLI) executable.&lt;br /&gt;
* [http://www.viva64.com/en/ PVS-Studio] (PVS-Studio) - For C/C++, C#&lt;br /&gt;
* [https://www.reshiftsecurity.com reshift] - A CI/CD tool that uses static code analysis to scan for vulnerabilities and uses machine learning to give a prediction on false positives. Supports Java with future support for NodeJS and JavaScript planned for sometime in 2019.&lt;br /&gt;
* [https://www.ripstech.com/ RIPS Code Analysis] (RIPS Technologies) - A SAST solution specialized for Java and PHP that detects unknown security vulnerabilities and code quality issues.&lt;br /&gt;
* [https://www.synopsys.com/software-integrity/resources/datasheets/secureassist.html SecureAssist] (Synopsys) - Scans code for insecure coding and configurations automatically as an IDE plugin for Eclipse, IntelliJ, and Visual Studio etc. Supports (Java, .NET, PHP, and JavaScript)&lt;br /&gt;
* [https://www.whitehatsec.com/products/static-application-security-testing/ Sentinel Source] (Whitehat)&lt;br /&gt;
* [https://www.synopsys.com/software-integrity/products/interactive-application-security-testing.html Seeker] (Synopsys) Seeker performs code security without actually doing static analysis. Seeker does Interactive Application Security Testing (IAST), correlating runtime code &amp;amp; data analysis with simulated attacks. It provides code level results without actually relying on static analysis.&lt;br /&gt;
* [http://www.sourcepatrol.co.uk/ Source Patrol] (Pentest)&lt;br /&gt;
* [https://www.defensecode.com/thunderscan.php Thunderscan SAST] (DefenseCode)&lt;br /&gt;
* [http://www.veracode.com/products/binary-static-analysis-sast Veracode Static Analysis] (Veracode)&lt;br /&gt;
* [http://www.xanitizer.net Xanitizer] - Scans Java and Scala for security vulnerabilities, mainly via taint analysis. Free for academic and open source projects (see [https://www.rigs-it.com/xanitizer-pricing/]).&lt;br /&gt;
&lt;br /&gt;
==More info==&lt;br /&gt;
&lt;br /&gt;
* [[Appendix_A:_Testing_Tools | Appendix A: Testing Tools]]&lt;br /&gt;
* [http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html NIST's list of Source Code Security Analysis Tools]&lt;br /&gt;
* [[:Category:Vulnerability_Scanning_Tools | DAST Tools]] - Similar info on Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
* [[Free for Open Source Application Security Tools]] - This page lists the Commercial Source Code Analysis Tools (SAST) we know of that are free for Open Source&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP .NET Project]]&lt;br /&gt;
[[Category:SAMM-CR-2]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Free_for_Open_Source_Application_Security_Tools&amp;diff=255589</id>
		<title>Free for Open Source Application Security Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Free_for_Open_Source_Application_Security_Tools&amp;diff=255589"/>
				<updated>2019-10-21T19:12:57Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: Changed the reshift link to point to the new website.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;__NOTOC__&lt;br /&gt;
== Introduction ==&lt;br /&gt;
OWASP's mission is to help the world improve the security of its software. One of the best ways OWASP can do that is to help Open Source developers improve the software they are producing that everyone else relies on. As such, the following lists of '''automated vulnerability detection tools''' that are '''free for open source''' projects have been gathered together here to raise awareness of their availability.&lt;br /&gt;
&lt;br /&gt;
We would encourage open source projects to use the following types of tools to improve the security and quality of their code:&lt;br /&gt;
* Static Application Security Testing ([[SAST]]) Tools &lt;br /&gt;
* Dynamic Application Security Testing ([[DAST]]) Tools - (Primarily for web apps)&lt;br /&gt;
* Interactive Application Security Testing (IAST) Tools - (Primarily for web apps and web APIs)&lt;br /&gt;
* Keeping Open Source libraries up-to-date (to avoid [[Top 10-2017 A9-Using Components with Known Vulnerabilities|Using Components with Known Vulnerabilities (OWASP Top 10-2017 A9)]])&lt;br /&gt;
* Static Code Quality Tools&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Disclaimer:''' &amp;lt;b&amp;gt;OWASP does not endorse any of the Vendors or Scanning Tools by listing them below. They are simply listed if we believe they are free for use by open source projects. We have made every effort to provide this information as accurately as possible. If you are the vendor of a free for open source tool and think this information is incomplete or incorrect, please send an e-mail to dave.wichers (at) owasp.org and we will make every effort to correct this information.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Free for Open Source Tools ==&lt;br /&gt;
Tools that are free for open source projects in each of the above categories are listed below.&lt;br /&gt;
&lt;br /&gt;
=== SAST Tools ===&lt;br /&gt;
OWASP already maintains a page of known SAST tools: [[Source Code Analysis Tools]], which includes a list of those that are &amp;quot;Open Source or Free Tools Of This Type&amp;quot;. Any such tools could certainly be used. One such cloud service that looks promising is:&lt;br /&gt;
* [https://lgtm.com/help/lgtm/about-lgtm LGTM.com] - A free for open source static analysis service that automatically monitors commits to publicly accessible code in: Bitbucket Cloud, GitHub, or GitLab. Supports C/C++, C#, COBOL (in beta), Java, JavaScript/TypeScript, Python&lt;br /&gt;
In addition, we are aware of the following commercial SAST tools that are free for Open Source projects:&lt;br /&gt;
* [https://scan.coverity.com/ Coverity Scan Static Analysis] - Can be lashed into Travis-CI so it's done automatically with online resources. Supports over a dozen programming languages as documented here in the section [https://www.synopsys.com/software-integrity/security-testing/static-analysis-sast.html Comprehensive support for these programming languages and frameworks].&lt;br /&gt;
* [https://www.reshiftsecurity.com reshift] - A CI/CD tool that uses static code analysis to scan for vulnerabilities and uses machine learning to give a prediction on false positives. Supports Java with future support for NodeJS and JavaScript planned for sometime in 2019. If you go to the Pricing section on this page, it says it is free for public repositories.&lt;br /&gt;
&lt;br /&gt;
=== DAST Tools ===&lt;br /&gt;
If your project has a web application component, we recommend running automated scans against it to look for vulnerabilities. OWASP maintains a page of known DAST Tools: [[:Category:Vulnerability Scanning Tools|Vulnerability Scanning Tools]], and the '''Licence''' column on this page indicates which of those tools have free capabilities. Our primary recommendation is to use one of these:&lt;br /&gt;
* [[OWASP Zed Attack Proxy Project|OWASP ZAP]] - A full featured free and open source DAST tool that includes both automated scanning for vulnerabilities and tools to assist expert manual web app pen testing.&lt;br /&gt;
** The ZAP team has also been working hard to make it easier to integrate ZAP into your CI/CD pipeline. (e.g., here's a [https://www.we45.com/blog/how-to-integrate-zap-into-jenkins-ci-pipeline-we45-blog blog post on how to integrate ZAP with Jenkins]).&lt;br /&gt;
* [http://www.arachni-scanner.com/ Arachni] - Arachni is a commercially supported scanner, but its free for most use cases, including scanning open source projects.&lt;br /&gt;
We are not aware of any other commercial grade tools that offer their full featured DAST product free for open source projects.&lt;br /&gt;
&lt;br /&gt;
=== IAST Tools ===&lt;br /&gt;
IAST tools are typically geared to analyze Web Applications and Web APIs, but that is vendor specific. There may be IAST products that can perform good security analysis on non-web applications as well.&lt;br /&gt;
&lt;br /&gt;
We are aware of only one IAST Tool that is free after registration at this time:&lt;br /&gt;
* [https://www.contrastsecurity.com/contrast-community-edition Contrast Community Edition (CE)] - Fully featured version for 1 app and up to 5 users (some Enterprise features disabled). Contrast CE supports Java only.&lt;br /&gt;
&lt;br /&gt;
=== Open Source Software (OSS) Security Tools ===&lt;br /&gt;
OSS refers to the open source libraries or components that application developers leverage to quickly develop new applications and add features to existing apps. Gartner refers to the analysis of the security of these components as software composition analysis (SCA). So OSS Analysis and SCA are the same thing.&lt;br /&gt;
&lt;br /&gt;
OWASP recommends that all software projects generally try to keep the libraries they use as up-to-date as possible to reduce the likelihood of [[Top 10-2017 A9-Using Components with Known Vulnerabilities|Using Components with Known Vulnerabilities (OWASP Top 10-2017 A9)]]. There are two recommended approaches for this:&lt;br /&gt;
&lt;br /&gt;
==== Keeping Your Libraries Updated ====&lt;br /&gt;
Using the latest version of each library is recommended because security issues are frequently fixed 'silently' by the component maintainer. By silently, we mean without publishing a [https://cve.mitre.org/ CVE] for the security fix.&lt;br /&gt;
* [https://www.mojohaus.org/versions-maven-plugin/ Maven Versions plugin]&lt;br /&gt;
** For Maven projects, can be used to generate a report of all dependencies used and when upgrades are available for them. Either a direct report, or part of the overall project documentation using: mvn site.&lt;br /&gt;
* Dependabot - https://dependabot.com/&lt;br /&gt;
** A GitHub only service that creates pull requests to keep your dependencies up-to-date. It automatically generates a pull request for each dependency you can upgrade, which you can then ignore, or accept, as you like. It supports tons of languages.&lt;br /&gt;
** Recommended for all open source projects maintained on GitHub!&lt;br /&gt;
&lt;br /&gt;
==== Detecting Known Vulnerable Components ====&lt;br /&gt;
As an alternative, or in addition to, trying to keep all your components up-to-date, a project can specifically monitor whether any of the components they use have known vulnerable components.&lt;br /&gt;
&lt;br /&gt;
Free tools of this type:&lt;br /&gt;
* OWASP has its own free open source tool [[OWASP Dependency Check]] that is free for anyone to use.&lt;br /&gt;
* GitHub: Security alerts for vulnerable dependencies - https://help.github.com/articles/about-security-alerts-for-vulnerable-dependencies/&lt;br /&gt;
** A native GitHub feature that reports known vulnerable dependencies in your GitHub projects. Supports: Java, .NET, JavaScript, Ruby, and Python. Your GitHub projects are automatically signed up for this service.&lt;br /&gt;
Commercial tools of this type that are free for open source:&lt;br /&gt;
* Contrast Community Edition (CE) (mentioned earlier) also has both Known Vulnerable Component detection and Available Updates reporting for OSS. CE supports Java only.&lt;br /&gt;
* Snyk - https://www.snyk.io - Supports Node.js, Ruby, Java, Python, Scala, Golang, .NET, PHP - Latest list here: https://snyk.io/docs&lt;br /&gt;
** A Commercial tool that identifies vulnerable components and integrates with numerous CI/CD pipelines. It is free for open source: https://snyk.io/plans&lt;br /&gt;
** If you don't want to grant Snyk write access to your repo (see it can auto-create pull requests) you can use the Command Line Interface (CLI) instead. See: https://snyk.io/docs/using-snyk. If you do this and want it to be free, you have to configure Snyk so it know its open source: https://support.snyk.io/snyk-cli/how-can-i-set-a-snyk-cli-project-as-open-source&lt;br /&gt;
*** Another benefit of using the Snyk CLI is that it won't auto create Pull requests for you (which makes these 'issues' more public than you might prefer)&lt;br /&gt;
** They also provide detailed information and remediation guidance for known vulnerabilities here: https://snyk.io/vuln&lt;br /&gt;
* SourceClear - https://www.sourceclear.com/ - Supports: Java, Ruby, JavaScript, Python, Objective C, GO, PHP&lt;br /&gt;
** They have a free trial right from their [https://www.sourceclear.com/ home page]. When the 30 day trial expires, it converts into a free &amp;quot;Personal Account&amp;quot; per: &amp;quot;Upgrade at any time to get the features that matter most to you, or choose the Personal plan when your trial ends.&amp;quot; Personal Account described here: https://www.sourceclear.com/pricing/&lt;br /&gt;
** They also make their component vulnerability data (for publicly known vulns) free to search: https://www.sourceclear.com/vulnerability-database/search#_ (Very useful when trying to research a particular library)&lt;br /&gt;
* WhiteSource Bolt - Supports 200+ programming languages. https://www.whitesourcesoftware.com/&lt;br /&gt;
** Azure version: https://marketplace.visualstudio.com/items?itemName=whitesource.ws-bolt&lt;br /&gt;
** GitHub version: https://github.com/apps/whitesource-bolt-for-github Available starting in Nov. 2018.&lt;br /&gt;
&lt;br /&gt;
=== Code Quality tools ===&lt;br /&gt;
Quality has a significant correlation to security. As such, we recommend open source projects also consider using good code quality tools. A few that we are aware of are:&lt;br /&gt;
* SpotBugs (https://github.com/spotbugs/spotbugs) - Open source code quality tool for Java&lt;br /&gt;
** This is the active fork for FindBugs, so if you use Findbugs, you should switch to this.&lt;br /&gt;
** SpotBugs users should add the FindSecBugs plugin (http://find-sec-bugs.github.io/) to their SpotBugs setup, as it significantly improves on the very basic security checking native to SpotBugs.&lt;br /&gt;
&lt;br /&gt;
* SonarQube (https://www.sonarqube.org/)&lt;br /&gt;
** This is a commercially supported, very popular, free (and commercial) code quality tool. It includes most if not all the FindSecBugs security rules plus lots more for quality, including a free, internet online CI setup to run it against your open source projects. SonarQube supports numerous languages: https://www.sonarqube.org/features/multi-languages/&lt;br /&gt;
&lt;br /&gt;
Please let us know if you are aware of any other high quality application security tools that are free for open source (or simply add them to this page). We are particularly interested in identifying and listing commercial tools that are free for open source, as they tend to be better and easier to use than open source (free) tools. If you are aware of any missing from this list, please add them, or let us know (dave.wichers (at) owasp.org) and we'll confirm they are free, and add them for you. Please encourage your favorite commercial tool vendor to make their tool free for open source projects as well!!&lt;br /&gt;
&lt;br /&gt;
Finally, please forward this page to the open source projects you rely on and encourage them to use these free tools!&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=245990</id>
		<title>Source Code Analysis Tools</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Source_Code_Analysis_Tools&amp;diff=245990"/>
				<updated>2018-12-12T18:48:30Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Commercial Tools Of This Type */ Added reshift to the list&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;Source code analysis tools, also referred to as Static Application Security Testing (SAST) Tools, are designed to analyze source code and/or compiled versions of code to help find security flaws. &lt;br /&gt;
&lt;br /&gt;
Some tools are starting to move into the IDE. For the types of problems that can be detected during the software development phase itself, this is a powerful phase within the development life cycle to employ such tools, as it provides immediate feedback to the developer on issues they might be introducing into the code during code development itself. This immediate feedback is very useful, especially when compared to finding vulnerabilities much later in the development cycle.&lt;br /&gt;
&lt;br /&gt;
== Strengths and Weaknesses ==&lt;br /&gt;
&lt;br /&gt;
=== Strengths ===&lt;br /&gt;
&lt;br /&gt;
* Scales well -- can be run on lots of software, and can be run repeatedly (as with nightly builds or continuous integration)&lt;br /&gt;
* Useful for things that such tools can automatically find with high confidence, such as buffer overflows, SQL Injection Flaws, and so forth&lt;br /&gt;
* Output is good for developers -- highlights the precise source files, line numbers, and even subsections of lines that are affected&lt;br /&gt;
&lt;br /&gt;
=== Weaknesses ===&lt;br /&gt;
&lt;br /&gt;
* Many types of security vulnerabilities are difficult to find automatically, such as authentication problems, access control issues, insecure use of cryptography, etc. The current state of the art only allows such tools to automatically find a relatively small percentage of application security flaws. However, tools of this type are getting better.&lt;br /&gt;
* High numbers of false positives.&lt;br /&gt;
* Frequently can't find configuration issues, since they are not represented in the code.&lt;br /&gt;
* Difficult to 'prove' that an identified security issue is an actual vulnerability.&lt;br /&gt;
* Many of these tools have difficulty analyzing code that can't be compiled. Analysts frequently can't compile code because they don't have the right libraries, all the compilation instructions, all the code, etc.&lt;br /&gt;
&lt;br /&gt;
==Important Selection Criteria==&lt;br /&gt;
&lt;br /&gt;
* Requirement: Must support your programming language, but not usually a key factor once it does.&lt;br /&gt;
* Types of vulnerabilities it can detect (out of the [[OWASP Top Ten]]?) (plus more?)&lt;br /&gt;
* How accurate is it? False Positive/False Negative rates?&lt;br /&gt;
** Does the tool have an OWASP [[Benchmark]] score?&lt;br /&gt;
* Does it understand the libraries/frameworks you use?&lt;br /&gt;
* Does it require a fully buildable set of source?&lt;br /&gt;
* Can it run against binaries instead of source?&lt;br /&gt;
* Can it be integrated into the developer's IDE?&lt;br /&gt;
* How hard is it to setup/use?&lt;br /&gt;
* Can it be run continuously and automatically?&lt;br /&gt;
* License cost for the tool. (Some are sold per user, per org, per app, per line of code analyzed. Consulting licenses are frequently different than end user licenses.)&lt;br /&gt;
&lt;br /&gt;
==OWASP Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [[OWASP SonarQube Project]]&lt;br /&gt;
* [http://www.owasp.org/index.php/Category:OWASP_Orizon_Project OWASP Orizon Project]&lt;br /&gt;
* [[OWASP_LAPSE_Project | OWASP LAPSE Project]]&lt;br /&gt;
* [[OWASP O2 Platform]]&lt;br /&gt;
* [[OWASP WAP-Web Application Protection]]&lt;br /&gt;
&lt;br /&gt;
==Disclaimer==&lt;br /&gt;
&lt;br /&gt;
Disclaimer: &amp;lt;b&amp;gt;The tools listed in the tables below are presented in alphabetical order. &amp;lt;i&amp;gt;OWASP does not endorse any of the vendors or tools by listing them in the table below.&amp;lt;/i&amp;gt; We have made every effort to provide this information as accurately as possible. If you are the vendor of a tool below and think that this information is incomplete or incorrect, please send an e-mail to our mailing list and we will make every effort to correct this information.&amp;lt;/b&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Open Source or Free Tools Of This Type==&lt;br /&gt;
&lt;br /&gt;
* [https://wiki.openstack.org/wiki/Security/Projects/Bandit Bandit] - bandit is a comprehensive source vulnerability scanner for Python&lt;br /&gt;
* [http://brakemanscanner.org/ Brakeman] - Brakeman is an open source vulnerability scanner specifically designed for Ruby on Rails applications&lt;br /&gt;
* [http://rubygems.org/gems/codesake-dawn Codesake Dawn] - Codesake Dawn is an open source security source code analyzer designed for Sinatra, Padrino for Ruby on Rails applications. It also works on non-web applications written in Ruby&lt;br /&gt;
* [http://findbugs.sourceforge.net/ FindBugs] - (Legacy - NOT Maintained - Use SpotBugs (see below) instead) - Find bugs (including a few security flaws) in Java programs&lt;br /&gt;
* [https://find-sec-bugs.github.io/ FindSecBugs] - A security specific plugin for SpotBugs that significantly improves SpotBugs's ability to find security vulnerabilities in Java programs. Works with the old FindBugs too,&lt;br /&gt;
* [http://www.dwheeler.com/flawfinder/ Flawfinder] Flawfinder - Scans C and C++&lt;br /&gt;
* [https://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/ Google CodeSearchDiggity] - Uses Google Code Search to identifies vulnerabilities in open source code projects hosted by Google Code, MS CodePlex, SourceForge, Github, and more. The tool comes with over 130 default searches that identify SQL injection, cross-site scripting (XSS), insecure remote and local file includes, hard-coded passwords, and much more.  ''Essentially, Google CodeSearchDiggity provides a source code security analysis of nearly every single open source code project in existence – simultaneously.''&lt;br /&gt;
* [https://github.com/wireghoul/graudit/ Graudit] - Scans multiple languages for various security flaws.&lt;br /&gt;
* [https://lgtm.com/help/lgtm/about-lgtm LGTM] - A free for open source static analysis service that automatically monitors commits to publicly accessible code in: Bitbucket Cloud, GitHub, or GitLab. Supports C/C++, C#, COBOL (in beta), Java, JavaScript/TypeScript, Python&lt;br /&gt;
* [http://pmd.sourceforge.net/ PMD] - PMD scans Java source code and looks for potential code problems (this is a code quality tool that does not focus on security issues)&lt;br /&gt;
* [https://github.com/designsecurity/progpilot Progpilot] - Progpilot is a static analyzer tool for PHP that detects security vulnerabilities such as XSS and SQL Injection.&lt;br /&gt;
* [http://msdn.microsoft.com/en-us/library/ms933794.aspx PreFast] (Microsoft) - PREfast is a static analysis tool that identifies defects in C/C++ programs. Last update 2006.&lt;br /&gt;
* [https://pumascan.com/ Puma Scan] - Puma Scan is a .NET C# open source static source code analyzer that runs as an IDE plugin for Visual Studio and via MSBuild in CI pipelines.&lt;br /&gt;
* [https://dotnet-security-guard.github.io/ .NET Security Guard] - Roslyn analyzers that aim to help security audits on .NET applications. It will find SQL injections, LDAP injections, XXE, cryptography weakness, XSS and more.&lt;br /&gt;
* [http://rips-scanner.sourceforge.net/ RIPS] - RIPS is a static source code analyzer for vulnerabilities in PHP web applications. Please see notes on the sourceforge.net site.&lt;br /&gt;
* [https://github.com/FloeDesignTechnologies/phpcs-security-audit phpcs-security-audit] - phpcs-security-audit is a set of PHP_CodeSniffer rules that finds flaws or weaknesses related to security in PHP and its popular CMS or frameworks.  It currently has core PHP rules as well as Drupal 7 specific rules.&lt;br /&gt;
* [http://www.sonarqube.org/ SonarQube] - Scans source code for more than 20 languages for Bugs, Vulnerabilities, and Code Smells. SonarQube IDE plugins for Eclipse, Visual Studio, and IntelliJ provided by [http://www.sonarlint.org/ SonarLint].&lt;br /&gt;
* [https://spotbugs.github.io/ SpotBugs] - This is the active fork replacement for FindBugs, which is not maintained anymore.&lt;br /&gt;
* [http://sourceforge.net/projects/visualcodegrepp/ VisualCodeGrepper (VCG)] - Scans C/C++, C#, VB, PHP, Java, and PL/SQL for security issues and for comments which may indicate defective code. The config files can be used to carry out additional checks for banned functions or functions which commonly cause security issues.&lt;br /&gt;
&lt;br /&gt;
==Commercial Tools Of This Type==&lt;br /&gt;
* [https://www.ptsecurity.com/ww-en/products/ai/ Application Inspector] (Positive Technologies) - combines SAST, DAST, IAST, SCA, configuration analysis and other technologies, incl. unique abstract interpretation; has capability to generate test queries (exploits) to verify detected vulnerabilities during SAST analysis; Supported languages include: Java, C#, PHP, JavaScript, Objective C, VB.Net, PL/SQL, T-SQL, and others. &lt;br /&gt;
* [https://www.ibm.com/us-en/marketplace/application-security-on-cloud Application Security on Cloud] (IBM) - Provides SAST, DAST and mobile security testing as well as OpenSource library known vulnerability detection as a cloud service. &lt;br /&gt;
* [http://www-01.ibm.com/software/rational/products/appscan/source/ AppScan Source] (IBM)&lt;br /&gt;
* [http://www.blueclosure.com BlueClosure BC Detect] (BlueClosure) - Analyzes client-side JavaScript.&lt;br /&gt;
* [https://buguroo.com/products/bugblast-next-gen-appsec-platform/bugscout-sca bugScout] (Buguroo Offensive Security)&lt;br /&gt;
* [http://www.castsoftware.com/solutions/application-security/cwe#SupportedSecurityStandards CAST AIP] (CAST) Performs static and architectural analysis to identify numerous types of security issues. Supports over 30 languages.&lt;br /&gt;
* [https://www.codacy.com/ Codacy] Offers security patterns for languages such as Python, Ruby, Scala, Java, JavaScript and more. Integrates with tools such as Brakeman, Bandit, FindBugs, and others. (free for open source projects)&lt;br /&gt;
* [http://www.contrastsecurity.com/ Contrast] (Contrast Security) - Contrast performs code security without actually doing static analysis. Contrast does Interactive Application Security Testing (IAST), correlating runtime code &amp;amp; data analysis. It provides code level results without actually relying on static analysis.&lt;br /&gt;
* [http://www.coverity.com/products/code-advisor/ Coverity Code Advisor] (Synopsys)&lt;br /&gt;
* [https://www.checkmarx.com/technology/static-code-analysis-sca/ CxSAST] (Checkmarx)&lt;br /&gt;
* [http://www8.hp.com/us/en/software-solutions/static-code-analysis-sast/ Fortify] (Micro Focus, Formally HP)&lt;br /&gt;
* [http://www.juliasoft.com/solutions Julia] (JuliaSoft) - SaaS Java static analysis&lt;br /&gt;
* [http://www.klocwork.com/capabilities/static-code-analysis KlocWork] (KlocWork)&lt;br /&gt;
* [https://www.kiuwan.com/code-analysis/ Kiuwan] (an [http://www.optimyth.com Optimyth] company) - SaaS Software Quality &amp;amp; Security Analysis&lt;br /&gt;
* [http://www.parasoft.com/jsp/capabilities/static_analysis.jsp?itemId=547 Parasoft Test] (Parasoft)&lt;br /&gt;
* [https://pitss.com/products/pitss-con/ PITSS.CON] (PITTS)&lt;br /&gt;
* [http://www.viva64.com/en/ PVS-Studio] (PVS-Studio) - For C/C++, C#&lt;br /&gt;
* [https://pumascanpro.com/ Puma Scan Professional] - A .NET C# static source code analyzer that runs as an IDE plugin for Visual Studio and via MSBuild in CI pipelines.&lt;br /&gt;
* [https://www.softwaresecured.com/reshift reshift] - A CI/CD tool that uses static code analysis to scan for vulnerabilities and use machine learning to give a prediction on false positives.&lt;br /&gt;
* [https://www.ripstech.com/ RIPS Code Analysis] (RIPS Technologies) - A SAST solution specialized for PHP that detects unknown security vulnerabilities and code quality issues.&lt;br /&gt;
* [https://www.synopsys.com/software-integrity/resources/datasheets/secureassist.html SecureAssist] (Synopsys) - Scans code for insecure coding and configurations automatically as an IDE plugin for Eclipse, IntelliJ, and Visual Studio etc. Supports (Java, .NET, PHP, and JavaScript)&lt;br /&gt;
* [https://www.whitehatsec.com/products/static-application-security-testing/ Sentinel Source] (Whitehat)&lt;br /&gt;
* [https://www.synopsys.com/software-integrity/products/interactive-application-security-testing.html Seeker] (Synopsys) Seeker performs code security without actually doing static analysis. Seeker does Interactive Application Security Testing (IAST), correlating runtime code &amp;amp; data analysis with simulated attacks. It provides code level results without actually relying on static analysis.&lt;br /&gt;
* [http://www.sourcepatrol.co.uk/ Source Patrol] (Pentest)&lt;br /&gt;
* [https://www.defensecode.com/thunderscan.php Thunderscan SAST] (DefenseCode)&lt;br /&gt;
* [http://www.veracode.com/products/binary-static-analysis-sast Veracode Static Analysis] (Veracode)&lt;br /&gt;
* [http://www.xanitizer.net Xanitizer] - Scans Java for security vulnerabilities, mainly via taint analysis. Free for academic and open source projects (see [https://www.rigs-it.com/xanitizer-pricing/]).&lt;br /&gt;
&lt;br /&gt;
==More info==&lt;br /&gt;
&lt;br /&gt;
* [[Appendix_A:_Testing_Tools | Appendix A: Testing Tools]]&lt;br /&gt;
* [http://samate.nist.gov/index.php/Source_Code_Security_Analyzers.html NIST's list of Source Code Security Analysis Tools]&lt;br /&gt;
* [[:Category:Vulnerability_Scanning_Tools | DAST Tools]] - Similar info on Dynamic Application Security Testing (DAST) Tools&lt;br /&gt;
&lt;br /&gt;
[[Category:OWASP .NET Project]]&lt;br /&gt;
[[Category:SAMM-CR-2]]&lt;br /&gt;
__NOTOC__&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=230870</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=230870"/>
				<updated>2017-06-21T23:06:34Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Slides from the Previous Meeting: */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@owasp.org Sherif Koussa] and Chapter Co-Leader is [mailto:tanya.janca@owasp.org Tanya Janca]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif] or [mailto:tanya.janca@owasp.org Tanya] &lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meetup page: http://www.meetup.com/OWASP-Ottawa/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Leadership  ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Coordinator: [mailto:tanya.janca@owasp.org Tanya Janca] &lt;br /&gt;
&lt;br /&gt;
Organization Committee: Garth Boyd, Pierre Ernst, Phil Dorman, Nancy Gariche, Adam Janzen&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Slides from the Previous Meeting: ===&lt;br /&gt;
Threat Modeling Toolkit - Jonathan Marcil - [https://www.owasp.org/images/0/02/Threat_Modeling_Toolkit_-_OWASP-ottawa-publish.pptx Slides]&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=230869</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=230869"/>
				<updated>2017-06-21T23:06:19Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@owasp.org Sherif Koussa] and Chapter Co-Leader is [mailto:tanya.janca@owasp.org Tanya Janca]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif] or [mailto:tanya.janca@owasp.org Tanya] &lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meetup page: http://www.meetup.com/OWASP-Ottawa/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Leadership  ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Coordinator: [mailto:tanya.janca@owasp.org Tanya Janca] &lt;br /&gt;
&lt;br /&gt;
Organization Committee: Garth Boyd, Pierre Ernst, Phil Dorman, Nancy Gariche, Adam Janzen&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== Slides from the Previous Meeting: ===&lt;br /&gt;
&lt;br /&gt;
=== Threat Modeling Toolkit - Jonathan Marcil - [https://www.owasp.org/images/0/02/Threat_Modeling_Toolkit_-_OWASP-ottawa-publish.pptx Slides] ===&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:Threat_Modeling_Toolkit_-_OWASP-ottawa-publish.pptx&amp;diff=230868</id>
		<title>File:Threat Modeling Toolkit - OWASP-ottawa-publish.pptx</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:Threat_Modeling_Toolkit_-_OWASP-ottawa-publish.pptx&amp;diff=230868"/>
				<updated>2017-06-21T23:06:02Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=230804</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=230804"/>
				<updated>2017-06-19T18:24:14Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: Added Tanya as chapter co-leader&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@owasp.org Sherif Koussa] and Chapter Co-Leader is [mailto:tanya.janca@owasp.org Tanya Janca]&lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif] or [mailto:tanya.janca@owasp.org Tanya] &lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meetup page: http://www.meetup.com/OWASP-Ottawa/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Leadership  ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Coordinator: [mailto:tanya.janca@owasp.org Tanya Janca] &lt;br /&gt;
&lt;br /&gt;
Organization Committee: Garth Boyd, Pierre Ernst, Phil Dorman, Nancy Gariche, Adam Janzen&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs&amp;gt;&amp;lt;/headertabs&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=224643</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=224643"/>
				<updated>2017-01-01T20:08:34Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Chapter Leadership */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif] or [mailto:tanya.janca@owasp.org Tanya] &lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meetup page: http://www.meetup.com/OWASP-Ottawa/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Leadership  ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Coordinator: [mailto:tanya.janca@owasp.org Tanya Janca] &lt;br /&gt;
&lt;br /&gt;
Organization Committee: Garth Boyd, Pierre Ernst, Phil Dorman, Nancy Gariche, Adam Janzen&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=224642</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=224642"/>
				<updated>2017-01-01T20:08:09Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif] or [mailto:tanya.janca@owasp.org Tanya] &lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meetup page: http://www.meetup.com/OWASP-Ottawa/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Leadership  ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Coordinator: [mailto:tanya.janca@owasp.org Tanya Janca] &lt;br /&gt;
Organization Committee: Garth Boyd, Pierre Ernst, Phil Dorman, Nancy Gariche, Adam Janzen&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=202925</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=202925"/>
				<updated>2015-11-02T00:27:02Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif] or [mailto:tanya.janca@owasp.org Tanya] &lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meetup page: http://www.meetup.com/OWASP-Ottawa/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Leadership  ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Coordinator: [mailto:tanya.janca@owasp.org Tanya Janca] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=202924</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=202924"/>
				<updated>2015-11-02T00:21:52Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2014 Sponsor==&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2Keys_Security_Solutions.jpg|240x120px|2Keys_Security_Solutions.jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif] or [mailto:tanya.janca@owasp.org Tanya] &lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meetup page: http://www.meetup.com/OWASP-Ottawa/&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Chapter Leadership  ==&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Coordinator: [mailto:tanya.janca@owasp.org Tanya Janca] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=202923</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=202923"/>
				<updated>2015-11-02T00:20:39Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2014 Sponsor==&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2Keys_Security_Solutions.jpg|240x120px|2Keys_Security_Solutions.jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif] or [mailto:tanya.janca@owasp.org Tanya] &lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Coordinator: [mailto:tanya.janca@owasp.org Tanya Janca] &lt;br /&gt;
&lt;br /&gt;
= Meetings =&lt;br /&gt;
&lt;br /&gt;
For updates, events, membership; please visit our meetup page: http://www.meetup.com/OWASP-Ottawa/&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=202922</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=202922"/>
				<updated>2015-11-02T00:14:23Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2014 Sponsor==&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2Keys_Security_Solutions.jpg|240x120px|2Keys_Security_Solutions.jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif] or [mailto:tanya.janca@owasp.org Tanya] &lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Coordinator: [mailto:tanya.janca@owasp.org Tanya Janca] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=202921</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=202921"/>
				<updated>2015-11-02T00:13:38Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2014 Sponsor==&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2Keys_Security_Solutions.jpg|240x120px|2Keys_Security_Solutions.jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean], [mailto:joel.hebert@opulentasp.com Joel] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter Leader: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Coordinator: [mailto:tanya.janca@owasp.org Tanya Janca] &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=185835</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=185835"/>
				<updated>2014-11-24T19:43:46Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Upcoming Events */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2014 Sponsor==&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2Keys_Security_Solutions.jpg|240x120px|2Keys_Security_Solutions.jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean], [mailto:joel.hebert@opulentasp.com Joel] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== DATE CHANGED: ROP It Like It's Hot: A 101 on BOFs, ROPs, and Shellcode Development on Linux ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Nadeem Douba&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
To a normal human, hacking things like browsers and software seems like black voodoo magic. Even people in IT security struggle with the basic understanding of how a buffer overflow works. This workshop aims to demystify the art of exploiting vulnerabilities in binary software and equips you with the tools to pwn software on your own! We'll cover the following topics:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
1. A brief introduction to Assembly&lt;br /&gt;
&lt;br /&gt;
2. A brief overview of the Linux Stack&lt;br /&gt;
&lt;br /&gt;
3. Our Toolkit for Exploit Development&lt;br /&gt;
&lt;br /&gt;
4. Controlling the Instruction Pointer  &lt;br /&gt;
*Classic BOF (no strings attached)  &lt;br /&gt;
*ROP till' you drop (Defeating NX)  &lt;br /&gt;
*Where am I? (Defeating ASLR)   &lt;br /&gt;
*Silence the Canary (Defeating Stack Canaries)&lt;br /&gt;
&lt;br /&gt;
5. Advanced Topics to Research&lt;br /&gt;
&lt;br /&gt;
Students are expected to bring a laptop as this workshop is hands-on. The following tools/software is required:&lt;br /&gt;
&lt;br /&gt;
*A VMWare image of 32-bit Kali Linux (download: http://cdimage.kali.org/kali-1.0.9a/kali-linux-1.0.9a-i386.iso)&lt;br /&gt;
*PEDA (https://github.com/longld/peda)- Metasploit (apt-get install metasploit)- Shelln00b (apt-get install shellnoob)- ROPGadget (git clone  https://github.com/0vercl0k/rp)&lt;br /&gt;
*IDA Demo 6.6 for Linux (http://out7.hex-rays.com/files/idademo66_linux.tgz)&lt;br /&gt;
&lt;br /&gt;
Students are encouraged to work in groups so encourage your friends to come along!&lt;br /&gt;
&lt;br /&gt;
WARNING: We are in no way responsible for any hair loss during the course of this workshop. Successfully exploiting software may result in unusual happy dance behaviour. &lt;br /&gt;
&lt;br /&gt;
'''Where'''&lt;br /&gt;
&lt;br /&gt;
Microsoft Glacier Room 100 Queen Street, Suite 500 - World Exchange Plaza&lt;br /&gt;
&lt;br /&gt;
''Find the 100 Queen Street Building, Take the elevator to the 5th floor. Be there before 6:00 PM as the elevators stop working then.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When (NEW DATE)'''&lt;br /&gt;
&lt;br /&gt;
Tuesday, December 2nd, 2014 from 5:30PM to 7:30PM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Register for free: [http://www.meetup.com/OWASP-Ottawa-Meetup-Web-Application-Security/events/188223862/ here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
&lt;br /&gt;
==== September 2014 ====&lt;br /&gt;
&lt;br /&gt;
'''Title: ''' Cloud Computing – Security and Interoperability Perspectives&lt;br /&gt;
&lt;br /&gt;
'''What''' Many organizations are evaluating and migrating toward cloud computing solutions.  In 2013, some the key challenges pertain to security and interoperability.  Open cloud standards can help manage risks, while fostering efficient solution delivery.&lt;br /&gt;
&lt;br /&gt;
Steven Woodward shares updates from numerous international cloud standards related organizations. In Canada, he leads several of the cloud computing initiatives in both the private and public sectors.  This includes being one of the founding board members of the Cloud Security Alliance Canadian Chapter.&lt;br /&gt;
&lt;br /&gt;
Steven describes key cloud ecosystems models; highlighting where security considerations fit, along with different perspectives on interoperability.  Several real-life scenarios will be used, highlighting cloud concepts, security, interoperability and the impacts these can have on commitments (functionality, costs, time-to-value and quality).  Service Agreements and Service Level Agreements will also be addressed to identify where you may find security and interoperability considerations specified in the contracts.&lt;br /&gt;
&lt;br /&gt;
'''Who''' Steven Woodward, CEO, Cloud Perspectives&lt;br /&gt;
&lt;br /&gt;
==== August 2014 ====&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Social Engineering - ASP.Net Defense Systems&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Social Engineering from the ground up. From creation of the attack vectors in the Social Engineering Toolkit, to execution, to defense in ASP.Net. We shall oversee what defense mechanisms or techniques exist to defend against certain Social Engineering Attacks. &lt;br /&gt;
&lt;br /&gt;
The take away: ASP.Net Techniques and modules, SET Experience and techniques.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Joel Hebert - MVP &lt;br /&gt;
&lt;br /&gt;
Joel Hebert is a Software Architect who resides in Ottawa. He is passionate about Security and Architecture. He is a seven time ASP.Net MVP and is one of the User Group Leaders in Ottawa. He would like to share his knowledge of Social Engineering, Web Application Defences and Continuous Audit with you to allow you to think about the modern attack vectors that are present. &lt;br /&gt;
&lt;br /&gt;
==== June 2014====&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Another Bug? Secure Software Development Lifecycle&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
As dev and test most of us have been in the situation where a security bug is found by a customer and we find ourselves asking – 'how did we miss that'. With a focus on the challenges facing development and test teams, we'll explore some of the issues and solutions that can help improve your SDLC.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Sean Wilson from CBN will be presenting on Secure Software Development.&lt;br /&gt;
&lt;br /&gt;
==== May 2014====&lt;br /&gt;
&lt;br /&gt;
'''Title:'''Gone in 60 Milliseconds: Mobile devices, free WiFi and your data&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Smart phones and tablets broadcast information that anyone can use to discover where you live, where you work and the places you go. Free WiFi networks allow attackers to intercept and alter your communications. This presentation shows a series of live demonstrations showing exactly how this is done and how easy it is. &lt;br /&gt;
&lt;br /&gt;
We show in real time what information the broadcasts your mobile devices send 24/7 reveal about you, and how attackers use fake WiFi access points and man-in-the-middle attacks to capture passwords, subvert VPNs, and install malicious software. The root causes of these issues are explored, and we present solutions, both simple and complex, to safeguard your data, your privacy and your identity. &lt;br /&gt;
&lt;br /&gt;
'''Who''' &lt;br /&gt;
Derrick Webber from CGI will be presenting on mobile device security.&lt;br /&gt;
&lt;br /&gt;
====September 2013====&lt;br /&gt;
'''Title:'''What's Hiding in Your Software Components?&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.&lt;br /&gt;
&lt;br /&gt;
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development. &lt;br /&gt;
&lt;br /&gt;
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====June 2013====&lt;br /&gt;
'''Title:'''China: All up in your business - Annoying Persistent Threat edition&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.&lt;br /&gt;
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!&lt;br /&gt;
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]&lt;br /&gt;
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====May 2013====&lt;br /&gt;
'''Title:''' Ottawa IT Camp 2013&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Ottawa IT Camp is a fun filled day of &amp;quot;meat only&amp;quot; presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]&lt;br /&gt;
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 2013====&lt;br /&gt;
'''Title:''' XML Attack Surface&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers. &lt;br /&gt;
&lt;br /&gt;
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues. &lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
 [http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====December 2012====&lt;br /&gt;
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]&lt;br /&gt;
&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sean.wilson@owasp.org Sean Wilson] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=181564</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=181564"/>
				<updated>2014-09-02T10:58:46Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Your Local Chapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2014 Sponsor==&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2Keys_Security_Solutions.jpg|240x120px|2Keys_Security_Solutions.jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean], [mailto:joel.hebert@opulentasp.com Joel] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== Social Engineering - ASP.Net Defense Systems - KANATA Edition ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Joel Hebert - MVP &lt;br /&gt;
&lt;br /&gt;
Joel Hebert is a Software Architect who resides in Ottawa. He is passionate about Security and Architecture. He is a seven time ASP.Net MVP and is one of the User Group Leaders in Ottawa. He would like to share his knowledge of Social Engineering, Web Application Defences and Continuous Audit with you to allow you to think about the modern attack vectors that are present. &lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
Social Engineering from the ground up. From creation of the attack vectors in the Social Engineering Toolkit, to execution, to defense in ASP.Net. We shall oversee what defense mechanisms or techniques exist to defend against certain Social Engineering Attacks. &lt;br /&gt;
&lt;br /&gt;
The take away: ASP.Net Techniques and modules, SET Experience and techniques.  &lt;br /&gt;
&lt;br /&gt;
'''Where'''&lt;br /&gt;
&lt;br /&gt;
Entrust - 1000 Innovation Drive, Kanata&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When'''&lt;br /&gt;
&lt;br /&gt;
Tuesday, August 26 from 5:30PM to 7:30PM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Register for free: [http://www.meetup.com/OWASP-Ottawa-Meetup-Web-Application-Security/events/200891962/ here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
&lt;br /&gt;
==== June 2014====&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Another Bug? Secure Software Development Lifecycle&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
As dev and test most of us have been in the situation where a security bug is found by a customer and we find ourselves asking – 'how did we miss that'. With a focus on the challenges facing development and test teams, we'll explore some of the issues and solutions that can help improve your SDLC.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Sean Wilson from CBN will be presenting on Secure Software Development.&lt;br /&gt;
&lt;br /&gt;
==== May 2014====&lt;br /&gt;
&lt;br /&gt;
'''Title:'''Gone in 60 Milliseconds: Mobile devices, free WiFi and your data&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Smart phones and tablets broadcast information that anyone can use to discover where you live, where you work and the places you go. Free WiFi networks allow attackers to intercept and alter your communications. This presentation shows a series of live demonstrations showing exactly how this is done and how easy it is. &lt;br /&gt;
&lt;br /&gt;
We show in real time what information the broadcasts your mobile devices send 24/7 reveal about you, and how attackers use fake WiFi access points and man-in-the-middle attacks to capture passwords, subvert VPNs, and install malicious software. The root causes of these issues are explored, and we present solutions, both simple and complex, to safeguard your data, your privacy and your identity. &lt;br /&gt;
&lt;br /&gt;
'''Who''' &lt;br /&gt;
Derrick Webber from CGI will be presenting on mobile device security.&lt;br /&gt;
&lt;br /&gt;
====September 2013====&lt;br /&gt;
'''Title:'''What's Hiding in Your Software Components?&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.&lt;br /&gt;
&lt;br /&gt;
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development. &lt;br /&gt;
&lt;br /&gt;
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====June 2013====&lt;br /&gt;
'''Title:'''China: All up in your business - Annoying Persistent Threat edition&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.&lt;br /&gt;
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!&lt;br /&gt;
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]&lt;br /&gt;
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====May 2013====&lt;br /&gt;
'''Title:''' Ottawa IT Camp 2013&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Ottawa IT Camp is a fun filled day of &amp;quot;meat only&amp;quot; presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]&lt;br /&gt;
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 2013====&lt;br /&gt;
'''Title:''' XML Attack Surface&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers. &lt;br /&gt;
&lt;br /&gt;
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues. &lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
 [http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====December 2012====&lt;br /&gt;
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]&lt;br /&gt;
&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sean.wilson@owasp.org Sean Wilson] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=180543</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=180543"/>
				<updated>2014-08-14T10:45:14Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Social Engineering - ASP.Net Defense Systems */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2014 Sponsor==&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2Keys_Security_Solutions.jpg|240x120px|2Keys_Security_Solutions.jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== Social Engineering - ASP.Net Defense Systems - KANATA Edition ===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Joel Hebert - MVP &lt;br /&gt;
&lt;br /&gt;
Joel Hebert is a Software Architect who resides in Ottawa. He is passionate about Security and Architecture. He is a seven time ASP.Net MVP and is one of the User Group Leaders in Ottawa. He would like to share his knowledge of Social Engineering, Web Application Defences and Continuous Audit with you to allow you to think about the modern attack vectors that are present. &lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
Social Engineering from the ground up. From creation of the attack vectors in the Social Engineering Toolkit, to execution, to defense in ASP.Net. We shall oversee what defense mechanisms or techniques exist to defend against certain Social Engineering Attacks. &lt;br /&gt;
&lt;br /&gt;
The take away: ASP.Net Techniques and modules, SET Experience and techniques.  &lt;br /&gt;
&lt;br /&gt;
'''Where'''&lt;br /&gt;
&lt;br /&gt;
Entrust - 1000 Innovation Drive, Kanata&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When'''&lt;br /&gt;
&lt;br /&gt;
Tuesday, August 26 from 5:30PM to 7:30PM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Register for free: [http://www.meetup.com/OWASP-Ottawa-Meetup-Web-Application-Security/events/200891962/ here]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
&lt;br /&gt;
==== June 2014====&lt;br /&gt;
&lt;br /&gt;
'''Title:''' Another Bug? Secure Software Development Lifecycle&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
As dev and test most of us have been in the situation where a security bug is found by a customer and we find ourselves asking – 'how did we miss that'. With a focus on the challenges facing development and test teams, we'll explore some of the issues and solutions that can help improve your SDLC.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Sean Wilson from CBN will be presenting on Secure Software Development.&lt;br /&gt;
&lt;br /&gt;
==== May 2014====&lt;br /&gt;
&lt;br /&gt;
'''Title:'''Gone in 60 Milliseconds: Mobile devices, free WiFi and your data&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Smart phones and tablets broadcast information that anyone can use to discover where you live, where you work and the places you go. Free WiFi networks allow attackers to intercept and alter your communications. This presentation shows a series of live demonstrations showing exactly how this is done and how easy it is. &lt;br /&gt;
&lt;br /&gt;
We show in real time what information the broadcasts your mobile devices send 24/7 reveal about you, and how attackers use fake WiFi access points and man-in-the-middle attacks to capture passwords, subvert VPNs, and install malicious software. The root causes of these issues are explored, and we present solutions, both simple and complex, to safeguard your data, your privacy and your identity. &lt;br /&gt;
&lt;br /&gt;
'''Who''' &lt;br /&gt;
Derrick Webber from CGI will be presenting on mobile device security.&lt;br /&gt;
&lt;br /&gt;
====September 2013====&lt;br /&gt;
'''Title:'''What's Hiding in Your Software Components?&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.&lt;br /&gt;
&lt;br /&gt;
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development. &lt;br /&gt;
&lt;br /&gt;
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====June 2013====&lt;br /&gt;
'''Title:'''China: All up in your business - Annoying Persistent Threat edition&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.&lt;br /&gt;
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!&lt;br /&gt;
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]&lt;br /&gt;
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====May 2013====&lt;br /&gt;
'''Title:''' Ottawa IT Camp 2013&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Ottawa IT Camp is a fun filled day of &amp;quot;meat only&amp;quot; presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]&lt;br /&gt;
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 2013====&lt;br /&gt;
'''Title:''' XML Attack Surface&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers. &lt;br /&gt;
&lt;br /&gt;
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues. &lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
 [http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====December 2012====&lt;br /&gt;
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]&lt;br /&gt;
&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sean.wilson@owasp.org Sean Wilson] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=176732</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=176732"/>
				<updated>2014-06-10T12:27:40Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Thanks to Our 2014 Sponsor */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2014 Sponsor==&lt;br /&gt;
{| border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2Keys_Security_Solutions.jpg|240x120px|2Keys_Security_Solutions.jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== Another Bug? Secure Software Development Lifecycle===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Sean Wilson from CBN will be presenting on Secure Software Development.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
As dev and test most of us have been in the situation where a security bug is found by a customer and we find ourselves asking – 'how did we miss that'. With a focus on the challenges facing development and test teams, we'll explore some of the issues and solutions that can help improve your SDLC.&lt;br /&gt;
&lt;br /&gt;
'''Where'''&lt;br /&gt;
&lt;br /&gt;
Microsoft Glacier Room 100 Queen Street, Suite 500 - World Exchange Plaza &lt;br /&gt;
&lt;br /&gt;
''Find the 100 Queen Street Building, Take the elevator to the 5th floor. Be there before 6:00 PM as the elevators stop working then.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When'''&lt;br /&gt;
&lt;br /&gt;
Wednesday, June 11 from 5:30PM to 7:30PM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Register for free [http://www.meetup.com/OWASP-Ottawa-Meetup-Web-Application-Security/events/181674482/ here]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== May 2014====&lt;br /&gt;
&lt;br /&gt;
'''Title:'''Gone in 60 Milliseconds: Mobile devices, free WiFi and your data&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Derrick Webber from CGI will be presenting on mobile device security.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
Smart phones and tablets broadcast information that anyone can use to discover where you live, where you work and the places you go. Free WiFi networks allow attackers to intercept and alter your communications. This presentation shows a series of live demonstrations showing exactly how this is done and how easy it is. &lt;br /&gt;
&lt;br /&gt;
We show in real time what information the broadcasts your mobile devices send 24/7 reveal about you, and how attackers use fake WiFi access points and man-in-the-middle attacks to capture passwords, subvert VPNs, and install malicious software. The root causes of these issues are explored, and we present solutions, both simple and complex, to safeguard your data, your privacy and your identity. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====September 2013====&lt;br /&gt;
'''Title:'''What's Hiding in Your Software Components?&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.&lt;br /&gt;
&lt;br /&gt;
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development. &lt;br /&gt;
&lt;br /&gt;
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====June 2013====&lt;br /&gt;
'''Title:'''China: All up in your business - Annoying Persistent Threat edition&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.&lt;br /&gt;
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!&lt;br /&gt;
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]&lt;br /&gt;
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====May 2013====&lt;br /&gt;
'''Title:''' Ottawa IT Camp 2013&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Ottawa IT Camp is a fun filled day of &amp;quot;meat only&amp;quot; presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]&lt;br /&gt;
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 2013====&lt;br /&gt;
'''Title:''' XML Attack Surface&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers. &lt;br /&gt;
&lt;br /&gt;
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues. &lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
 [http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====December 2012====&lt;br /&gt;
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]&lt;br /&gt;
&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sean.wilson@owasp.org Sean Wilson] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=176671</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=176671"/>
				<updated>2014-06-09T15:44:04Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Another Bug? Secure Software Development Lifecycle */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2014 Sponsor==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2Keys_Security_Solutions.jpg|240x120px|2Keys_Security_Solutions.jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== Another Bug? Secure Software Development Lifecycle===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Sean Wilson from CBN will be presenting on Secure Software Development.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
As dev and test most of us have been in the situation where a security bug is found by a customer and we find ourselves asking – 'how did we miss that'. With a focus on the challenges facing development and test teams, we'll explore some of the issues and solutions that can help improve your SDLC.&lt;br /&gt;
&lt;br /&gt;
'''Where'''&lt;br /&gt;
&lt;br /&gt;
Microsoft Glacier Room 100 Queen Street, Suite 500 - World Exchange Plaza &lt;br /&gt;
&lt;br /&gt;
''Find the 100 Queen Street Building, Take the elevator to the 5th floor. Be there before 6:00 PM as the elevators stop working then.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When'''&lt;br /&gt;
&lt;br /&gt;
Wednesday, June 11 from 5:30PM to 7:30PM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Register for free [http://www.meetup.com/OWASP-Ottawa-Meetup-Web-Application-Security/events/181674482/ here]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== May 2014====&lt;br /&gt;
&lt;br /&gt;
'''Title:'''Gone in 60 Milliseconds: Mobile devices, free WiFi and your data&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Derrick Webber from CGI will be presenting on mobile device security.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
Smart phones and tablets broadcast information that anyone can use to discover where you live, where you work and the places you go. Free WiFi networks allow attackers to intercept and alter your communications. This presentation shows a series of live demonstrations showing exactly how this is done and how easy it is. &lt;br /&gt;
&lt;br /&gt;
We show in real time what information the broadcasts your mobile devices send 24/7 reveal about you, and how attackers use fake WiFi access points and man-in-the-middle attacks to capture passwords, subvert VPNs, and install malicious software. The root causes of these issues are explored, and we present solutions, both simple and complex, to safeguard your data, your privacy and your identity. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====September 2013====&lt;br /&gt;
'''Title:'''What's Hiding in Your Software Components?&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.&lt;br /&gt;
&lt;br /&gt;
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development. &lt;br /&gt;
&lt;br /&gt;
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====June 2013====&lt;br /&gt;
'''Title:'''China: All up in your business - Annoying Persistent Threat edition&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.&lt;br /&gt;
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!&lt;br /&gt;
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]&lt;br /&gt;
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====May 2013====&lt;br /&gt;
'''Title:''' Ottawa IT Camp 2013&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Ottawa IT Camp is a fun filled day of &amp;quot;meat only&amp;quot; presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]&lt;br /&gt;
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 2013====&lt;br /&gt;
'''Title:''' XML Attack Surface&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers. &lt;br /&gt;
&lt;br /&gt;
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues. &lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
 [http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====December 2012====&lt;br /&gt;
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]&lt;br /&gt;
&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sean.wilson@owasp.org Sean Wilson] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=176670</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=176670"/>
				<updated>2014-06-09T15:43:40Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Another Bug? Secure Software Development Lifecycle */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2014 Sponsor==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2Keys_Security_Solutions.jpg|240x120px|2Keys_Security_Solutions.jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== Another Bug? Secure Software Development Lifecycle===&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Sean Wilson from CBN will be presenting on Secure Software Development.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
As dev and test most of us have been in the situation where a security bug is found by a customer and we find ourselves asking – 'how did we miss that'. With a focus on the challenges facing development and test teams, we'll explore some of the issues and solutions that can help improve your SDLC.&lt;br /&gt;
&lt;br /&gt;
'''Where'''&lt;br /&gt;
&lt;br /&gt;
Microsoft Glacier Room 100 Queen Street, Suite 500 - World Exchange Plaza &lt;br /&gt;
&lt;br /&gt;
''Find the 100 Queen Street Building, Take the elevator to the 5th floor. Be there before 6:00 PM as the elevators stop working then.''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When'''&lt;br /&gt;
&lt;br /&gt;
Wednesday, June 11 from 5:30PM to 7:30PM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Register for free [http://www.meetup.com/OWASP-Ottawa-Meetup-Web-Application-Security/events/178280042/ here]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sean.wilson@owasp.org Sean]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== May 2014====&lt;br /&gt;
&lt;br /&gt;
'''Title:'''Gone in 60 Milliseconds: Mobile devices, free WiFi and your data&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Derrick Webber from CGI will be presenting on mobile device security.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
Smart phones and tablets broadcast information that anyone can use to discover where you live, where you work and the places you go. Free WiFi networks allow attackers to intercept and alter your communications. This presentation shows a series of live demonstrations showing exactly how this is done and how easy it is. &lt;br /&gt;
&lt;br /&gt;
We show in real time what information the broadcasts your mobile devices send 24/7 reveal about you, and how attackers use fake WiFi access points and man-in-the-middle attacks to capture passwords, subvert VPNs, and install malicious software. The root causes of these issues are explored, and we present solutions, both simple and complex, to safeguard your data, your privacy and your identity. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====September 2013====&lt;br /&gt;
'''Title:'''What's Hiding in Your Software Components?&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.&lt;br /&gt;
&lt;br /&gt;
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development. &lt;br /&gt;
&lt;br /&gt;
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====June 2013====&lt;br /&gt;
'''Title:'''China: All up in your business - Annoying Persistent Threat edition&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.&lt;br /&gt;
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!&lt;br /&gt;
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]&lt;br /&gt;
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====May 2013====&lt;br /&gt;
'''Title:''' Ottawa IT Camp 2013&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Ottawa IT Camp is a fun filled day of &amp;quot;meat only&amp;quot; presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]&lt;br /&gt;
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 2013====&lt;br /&gt;
'''Title:''' XML Attack Surface&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers. &lt;br /&gt;
&lt;br /&gt;
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues. &lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
 [http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====December 2012====&lt;br /&gt;
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]&lt;br /&gt;
&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sean.wilson@owasp.org Sean Wilson] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=166774</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=166774"/>
				<updated>2014-01-27T15:38:01Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* OWASP Planning Meeting for 2014 */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2013 Sponsor==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Upcoming Events==&lt;br /&gt;
=== OWASP Planning Meeting for 2014===&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
This is OWASP Ottawa's annual connector meeting. Come out, meet your fellow OWASPers, and help us plan the chapter agenda for 2014.&lt;br /&gt;
&lt;br /&gt;
If you want to be part of the Chapter's core management team, come prepared with a plan on how and where you can add value.&lt;br /&gt;
&lt;br /&gt;
Topics to be discussed:&lt;br /&gt;
*Meeting frequency&lt;br /&gt;
*Meeting location&lt;br /&gt;
*Topics&lt;br /&gt;
*Training-days&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
'''Where'''&lt;br /&gt;
&lt;br /&gt;
Microsoft Glacier Room 100 Queen Street, Suite 500 - World Exchange Plaza &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When'''&lt;br /&gt;
&lt;br /&gt;
Monday, February 3 from 5:30PM to 7:30PM&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Registration'''&lt;br /&gt;
&lt;br /&gt;
Register for free [http://www.eventbrite.com/e/owasp-ottawa-planning-meeting-for-2014-tickets-10186601399 here]&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
====September 2013====&lt;br /&gt;
'''Title:'''What's Hiding in Your Software Components?&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.&lt;br /&gt;
&lt;br /&gt;
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development. &lt;br /&gt;
&lt;br /&gt;
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====June 2013====&lt;br /&gt;
'''Title:'''China: All up in your business - Annoying Persistent Threat edition&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.&lt;br /&gt;
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!&lt;br /&gt;
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]&lt;br /&gt;
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====May 2013====&lt;br /&gt;
'''Title:''' Ottawa IT Camp 2013&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Ottawa IT Camp is a fun filled day of &amp;quot;meat only&amp;quot; presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]&lt;br /&gt;
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 2013====&lt;br /&gt;
'''Title:''' XML Attack Surface&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers. &lt;br /&gt;
&lt;br /&gt;
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues. &lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
 [http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====December 2012====&lt;br /&gt;
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]&lt;br /&gt;
&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=157509</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=157509"/>
				<updated>2013-08-29T14:14:47Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* What's Hiding in Your Software Components? */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2013 Sponsor==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== What's Hiding in Your Software Components?===&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.&lt;br /&gt;
&lt;br /&gt;
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development. &lt;br /&gt;
&lt;br /&gt;
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When''': Thursday, Sept 5ht, 2013 : 6:00 PM&lt;br /&gt;
&lt;br /&gt;
==Countermeasure 2013==&lt;br /&gt;
{| &lt;br /&gt;
|[[Image:cmeasure2013.jpg|400x200px|cmeasure2013.jpg|link=http://www.countermeasure2013.com/]] &lt;br /&gt;
|COUNTERMEASURE is Ottawa's premier annual IT security conference and training event featuring the best of both offensive and defensive tactics. Past speakers have included globally recognized industry security researchers, Government of Canada representatives and seasoned enterprise security experts from the private sector.&lt;br /&gt;
OWASP Ottawa is offering a 10% discount on Countermeasure 2013 registration for all OWASP members. Just e-mail one of the chapter members with your OWASP membership number or DM us @OWASP_Ottawa and we will send you the discount code. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
====June 2013====&lt;br /&gt;
'''Title:'''China: All up in your business - Annoying Persistent Threat edition&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.&lt;br /&gt;
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!&lt;br /&gt;
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]&lt;br /&gt;
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====May 2013====&lt;br /&gt;
'''Title:''' Ottawa IT Camp 2013&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Ottawa IT Camp is a fun filled day of &amp;quot;meat only&amp;quot; presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]&lt;br /&gt;
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 2013====&lt;br /&gt;
'''Title:''' XML Attack Surface&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers. &lt;br /&gt;
&lt;br /&gt;
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues. &lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
 [http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====December 2012====&lt;br /&gt;
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]&lt;br /&gt;
&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=157508</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=157508"/>
				<updated>2013-08-29T13:57:13Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2013 Sponsor==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What's Hiding in Your Software Components?==&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.&lt;br /&gt;
&lt;br /&gt;
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development. &lt;br /&gt;
&lt;br /&gt;
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When''': Thursday, Sept 5ht, 2013 : 6:00 PM&lt;br /&gt;
&lt;br /&gt;
==Countermeasure 2013==&lt;br /&gt;
{| &lt;br /&gt;
|[[Image:cmeasure2013.jpg|400x200px|cmeasure2013.jpg|link=http://www.countermeasure2013.com/]] &lt;br /&gt;
|COUNTERMEASURE is Ottawa's premier annual IT security conference and training event featuring the best of both offensive and defensive tactics. Past speakers have included globally recognized industry security researchers, Government of Canada representatives and seasoned enterprise security experts from the private sector.&lt;br /&gt;
OWASP Ottawa is offering a 10% discount on Countermeasure 2013 registration for all OWASP members. Just e-mail one of the chapter members with your OWASP membership number or DM us @OWASP_Ottawa and we will send you the discount code. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
====June 2013====&lt;br /&gt;
'''Title:'''China: All up in your business - Annoying Persistent Threat edition&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.&lt;br /&gt;
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!&lt;br /&gt;
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]&lt;br /&gt;
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====May 2013====&lt;br /&gt;
'''Title:''' Ottawa IT Camp 2013&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Ottawa IT Camp is a fun filled day of &amp;quot;meat only&amp;quot; presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]&lt;br /&gt;
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 2013====&lt;br /&gt;
'''Title:''' XML Attack Surface&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers. &lt;br /&gt;
&lt;br /&gt;
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues. &lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
 [http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====December 2012====&lt;br /&gt;
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]&lt;br /&gt;
&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=157507</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=157507"/>
				<updated>2013-08-29T13:54:50Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2013 Sponsor==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== '''Update: Slides Posted!''' China: All up in your business - Annoying Persistent Threat edition==&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
&lt;br /&gt;
Software is no longer written, it's assembled. With 80% of a typical application now being assembled from components, it's time to take a hard look at the new risks posed by this type of development -- and the processes and tools that we'll need in order to keep them in check.&lt;br /&gt;
&lt;br /&gt;
On the just released OWASP Top 10 for 2013, entry A9 highlights the potential problems associated with the widespread use of open-source components with known security vulnerabilities in modern-day application development. &lt;br /&gt;
&lt;br /&gt;
Join Ryan Berg, Sonatype CSO, as he shares real world data on component risks, outlines the scope of the problem, and proposes approaches for managing these risk. You'll learn how security professionals can work cooperatively with application developers to reduce risk AND boost developer efficiency.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
&lt;br /&gt;
Ryan Berg is the Chief Security Officer at Sonatype. Before joining Sonatype, Ryan was a co-founder and chief scientist for Ounce Labs which was acquired by IBM in 2009. Ryan holds multiple patents and is a popular speaker, instructor and author, in the fields of security, risk management, and secure application development.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''When''': Thursday, Sept 5ht, 2013 : 6:00 PM&lt;br /&gt;
&lt;br /&gt;
==Countermeasure 2013==&lt;br /&gt;
{| &lt;br /&gt;
|[[Image:cmeasure2013.jpg|400x200px|cmeasure2013.jpg|link=http://www.countermeasure2013.com/]] &lt;br /&gt;
|COUNTERMEASURE is Ottawa's premier annual IT security conference and training event featuring the best of both offensive and defensive tactics. Past speakers have included globally recognized industry security researchers, Government of Canada representatives and seasoned enterprise security experts from the private sector.&lt;br /&gt;
OWASP Ottawa is offering a 10% discount on Countermeasure 2013 registration for all OWASP members. Just e-mail one of the chapter members with your OWASP membership number or DM us @OWASP_Ottawa and we will send you the discount code. &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
====June 2013====&lt;br /&gt;
'''Title:'''China: All up in your business - Annoying Persistent Threat edition&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
For the past few years, Dave has been involved in examining intrusions by a group informally known as Comment Crew -- which are now better known as 'APT1' following the recent release of the report from Mandiant. This group falls into the class of the 'Advanced Persistent Threat' and are known to use compromised web sites to supply command/control to compromised systems.&lt;br /&gt;
The talk contains a live demo of an annotated attack against a fictitious company, using custom malware and metasploit. It shows how attackers initially compromise a system, supply commands, install additional malware, gain privileges in post-exploit and loot the network for fun and profit!&lt;br /&gt;
This talk is targeted toward beginner/intermediate security practitioners and provides an overview of these types of attack. Whether you are simulating an APT style attack as a penetration tester or trying to defend your organization against similar threats this talk is a great starting point. Depending on interest it will be possible to focus some of the talk on the demo-malware code itself.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Dave Ockwell-Jenner has an extensive background in technology: from building one of the Internet’s earliest major web sites, to helping secure some of the world’s most critical systems. He has led the development of solutions for some of Canada’s most prominent technology companies, including Research In Motion and Nortel. He currently works for a Swiss-based company that specializes in IT and communications for the Air Transport Industry. In this role he has focused on designing and delivering the company's secure software development lifecycle. Through this, Dave regularly trains developers in secure software techniques, and has co-authored the SANS course on Developing Defensible Java EE Solutions. Dave also runs a boutique security consultancy called Prime Information Security, concentrating on information security within Small-to-Medium Businesses. He is a security blogger for TELUS and also co-founded a business networking organization called the Small Business Community Network (SBCN).&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/china-all-up-in-your-business-doj Slides]&lt;br /&gt;
[https://www.youtube.com/watch?v=2rJ2tHeb5yQ Video Demo]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====May 2013====&lt;br /&gt;
'''Title:''' Ottawa IT Camp 2013&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Ottawa IT Camp is a fun filled day of &amp;quot;meat only&amp;quot; presentations. By technical people, for technical people! The OWASP track focuses on application security talks covering threat modelling, code review, and the OWASP top 10.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://www.slideshare.net/OWASP_Ottawa/security-codereview-1 Secure Code Review for .NET]&lt;br /&gt;
[http://ottawaitcamp.codeplex.com/ Conference presentations and code]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====January 2013====&lt;br /&gt;
'''Title:''' XML Attack Surface&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Security vulnerabilities with XML processing can be a real threat to applications, especially when malicious XML can be submitted remotely. Fortunately, these issues can be easily avoided by properly configuring XML parsers. &lt;br /&gt;
&lt;br /&gt;
Several attack types will be presented with a live demo covering the following: Denial of Service, Arbitrary file Content disclosure, and Remote OS command injection.  Vulnerabilities caused by misconfiguration of XML parsing, XML transforms and Xpath queries will be investigated and suggestions on how to prevent these type of attacks will be provided with a developer perspective.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Pierre Ernst is a senior member of the IBM Business Analytics Security Competency Group at the Ottawa Lab in Canada. A former software developer turned penetration tester, he's responsible for finding security vulnerabilities in IBM applications before they are released. Using a combination of manual testing and secure code review, his work complements automated vulnerability scanners. Pierre is also responsible for giving guidance to developers on how to mitigate and fix security issues. &lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
 [http://www.slideshare.net/OWASP_Ottawa/pierre-ernst-xml-attack-surface-owasp-ottawa Download Here]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
====December 2012====&lt;br /&gt;
'''Title:''' Sploitego - Maltego's (Local) Partner in Crime&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
'''Slides'''&lt;br /&gt;
[http://cloud.github.com/downloads/allfro/sploitego/Sploitego%20-%20Hackfest%20Revolution.pdf Download Here]&lt;br /&gt;
&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa_IT_Camp_OWASP_Track&amp;diff=144657</id>
		<title>Ottawa IT Camp OWASP Track</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa_IT_Camp_OWASP_Track&amp;diff=144657"/>
				<updated>2013-02-17T03:05:08Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;==&amp;lt;center&amp;gt;'''Overview'''&amp;lt;/center&amp;gt;==&lt;br /&gt;
OWASP Ottawa have partnered with the Ottawa IT Camp 2013 to host an application security track at the sixth annual Ottawa IT Camp. The event will be held on May 4, 2013 at Algonquin College. Details can be found here: [http://www.ottawacodecamp.ca/pages2013/default.aspx &amp;lt;b&amp;gt;http://www.ottawacodecamp.ca/pages2013/default.aspx&amp;lt;/b&amp;gt;]&lt;br /&gt;
=&amp;lt;center&amp;gt;'''Ottawa IT Camp 2013 and OWASP Ottawa Call For Papers'''&amp;lt;/center&amp;gt;=&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The OWASP track of the Ottawa IT Code Camp is looking for hot talks on Application Security. We are interested in all topics related to Application Security, in particular:&lt;br /&gt;
&lt;br /&gt;
&amp;lt;dl&amp;gt;&lt;br /&gt;
&amp;lt;dd&amp;gt;- Secure development: frameworks, best practices, secure coding, methods, processes, SDLC&lt;br /&gt;
&amp;lt;dd&amp;gt;- Vulnerability analysis: code review, pentesting, static analysis&lt;br /&gt;
&amp;lt;dd&amp;gt;- Mobile security&lt;br /&gt;
&amp;lt;dd&amp;gt;- HTML5 security&lt;br /&gt;
&amp;lt;dd&amp;gt;- OWASP tools or projects in practice&lt;br /&gt;
&amp;lt;dd&amp;gt;- New technologies, paradigms, tools&lt;br /&gt;
&amp;lt;/dl&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
All sessions are 60 minutes in duration.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Proposals may be submitted here: [http://www.ottawacodecamp.ca/Pages2013/speaker.aspx &amp;lt;b&amp;gt;http://www.ottawacodecamp.ca/Pages2013/speaker.aspx&amp;lt;/b&amp;gt;]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please note that we will be accepting quality submissions as they are received so get your submissions in ASAP. The final deadline for submitting any talks is March, 15th 2013&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Please fill in as much information in the CFP submission form, and included the following inside the &amp;quot;Content&amp;quot; section:&lt;br /&gt;
&lt;br /&gt;
# Presentation Outline (provide bullet points of what is to be covered)&lt;br /&gt;
# Name of person/people presenting. Please attach bios for each presenter&lt;br /&gt;
# Explain what you hope attendees will gain from the presentation&lt;br /&gt;
# Provide reasons why your topic should be presented at the OWASP track of the IT Code Camp.&lt;br /&gt;
# Advise if a demonstration will be provided and, if so, provide details of any special equipment needed to support your presentation or demonstration&lt;br /&gt;
&lt;br /&gt;
Please note that we will not be entertaining presentations that are focused&lt;br /&gt;
&lt;br /&gt;
on selling services or products.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Unfortunately we are unable to cover travel and accommodations are for speakers.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Feel free to contact [mailto:sherif.koussa@owasp.orgo sherif.koussa@owasp.org] for any questions.&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=140670</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=140670"/>
				<updated>2012-12-04T19:19:23Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2012 Sponsor==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Sploitego - Maltego's (Local) Partner in Crime==&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
===What===&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
 &lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
 &lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
===Who===&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
===When===&lt;br /&gt;
The event is being planned for December 13th from 6pm - 8pm.&lt;br /&gt;
&lt;br /&gt;
===Where===&lt;br /&gt;
Microsoft's Glacier Room&lt;br /&gt;
100 Queen Street, Suite 500 &lt;br /&gt;
World Exchange Plaza, Ottawa (address/map can be found on the registration page)&lt;br /&gt;
&lt;br /&gt;
===Register for FREE===&lt;br /&gt;
[http://www.eventbrite.com/event/3692574590 Register Me for FREE]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=140631</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=140631"/>
				<updated>2012-12-04T02:54:18Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Thanks to Our 2012 Sponsor==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
 [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Sploitego - Maltego's (Local) Partner in Crime==&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
===What===&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
 &lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
 &lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
===Who===&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
===When===&lt;br /&gt;
The event is being planned for December 13th from 6pm - 8pm.&lt;br /&gt;
&lt;br /&gt;
===Where===&lt;br /&gt;
Our friends at Shopify have agreed to host yet another OWASP event! (address/map can be found on the registration page)&lt;br /&gt;
&lt;br /&gt;
===Register for FREE===&lt;br /&gt;
[http://www.eventbrite.com/event/3692574590 Register Me for FREE]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=140629</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=140629"/>
				<updated>2012-12-04T02:48:25Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Your Local Chapter */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Sploitego - Maltego's (Local) Partner in Crime==&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
===What===&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
 &lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
 &lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
===Who===&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
===When===&lt;br /&gt;
The event is being planned for December 13th from 6pm - 8pm.&lt;br /&gt;
&lt;br /&gt;
===Where===&lt;br /&gt;
Our friends at Shopify have agreed to host yet another OWASP event! (address/map can be found on the registration page)&lt;br /&gt;
&lt;br /&gt;
===Register for FREE===&lt;br /&gt;
[http://www.eventbrite.com/event/3692574590 Register Me for FREE]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=140628</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=140628"/>
				<updated>2012-12-04T02:46:52Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Sploitego - Maltego's (Local) Partner in Crime==&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
===What===&lt;br /&gt;
Have you ever wished for the power of Maltego when performing internal assessments? Ever hoped to map the internal network within seconds? Or that Maltego had a tad more aggression? Sploitego is the answer. In the presentation we'll show how we've carefully crafted several local transforms that gives Maltego the ooomph to operate nicely within internal networks. Can you say Metasploit integration? ARP spoofing? Passive fingerprinting? SNMP hunting? This all is Sploitego. But wait - there's more. Along the way we'll show you how to use our awesome Python framework that makes writing local transforms as easy as 'Hello World'.&lt;br /&gt;
 &lt;br /&gt;
Sploitego makes it easy to quickly develop, install, distribute, and maintain Maltego Local transforms. The framework comes with a rich set of auxiliary libraries to aid transform developers with integrating attack, reconnaissance, and post exploitation tools. It also provides a slew of web tools for interacting with public repositories.&lt;br /&gt;
 &lt;br /&gt;
Sploitego and its underlying Python framework will be released at DEF CON as open source - yup - you can extend it to your heart's content. During the presentation we'll show the awesome power of the tool with live demos and scenarios as well as fun and laughter.&lt;br /&gt;
&lt;br /&gt;
===Who===&lt;br /&gt;
Nadeem Douba - GWAPT, GPEN: Currently situated in the Ottawa (Ontario, Canada) valley, Nadeem provides technical security consulting services primarily to clients in the health, education, and public sectors. Nadeem has been involved within the security community for over 10 years and has frequently presented at ISSA and company seminars and training sessions. He is also an active member of the open source software community and has contributed to projects such as libnet, Backtrack, and Maltego.&lt;br /&gt;
&lt;br /&gt;
===When===&lt;br /&gt;
The event is being planned for December 13th from 6pm - 8pm.&lt;br /&gt;
&lt;br /&gt;
===Where===&lt;br /&gt;
Our friends at Shopify have agreed to host yet another OWASP event! (address/map can be found on the registration page)&lt;br /&gt;
&lt;br /&gt;
===Register for FREE===&lt;br /&gt;
[http://www.eventbrite.com/event/3692574590 Register Me for FREE]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=140627</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=140627"/>
				<updated>2012-12-04T02:44:04Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==N00bs Night: Secure Code Review==&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
===What===&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
===Who===&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
===When===&lt;br /&gt;
The event is being planned for June 21st from 6pm - 9pm. The event will start around 6:30pm to allow everyone to settle in.&lt;br /&gt;
&lt;br /&gt;
===Where===&lt;br /&gt;
Our friends at Shopify have agreed to host yet another OWASP event! (address/map can be found on the registration page)&lt;br /&gt;
&lt;br /&gt;
===Register for FREE===&lt;br /&gt;
[http://www.eventbrite.com/event/3692574590 Register Me for FREE]&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
====N00bs Night: Secure Code Review====&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
'''What'''&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
'''Who'''&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=130857</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=130857"/>
				<updated>2012-06-02T15:56:10Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
| [[Image:RK_logo-rgb.jpg|300x150px|SS_logo.png|link=http://rigelksecurity.com]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Countermeasure 2012==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:cm_logo.png|300x150px|cm_logo.png|link=http://www.countermeasure2012.com]] &lt;br /&gt;
| OWASP Ottawa is proud to support the upcoming Countermeasure 2012 computer security conference right here in our home town. Check out their [http://www.countermeasure2012.com/ website] for more information and contact us with your OWASP membership number to receive a &amp;lt;b&amp;gt;10%&amp;lt;/b&amp;gt; discount. To get your discount code either sign up for our [http://lists.owasp.org/mailman/listinfo/owasp-ottawa mailing list] or contact one of the chapter affiliates directly with your OWASP membership number:  [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike]. See you there!&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==N00bs Night: Secure Code Review==&lt;br /&gt;
Come join us for a night of free hands on tutorials in secure code review. Learn the OWASP top 10 from a developer's perspective.&lt;br /&gt;
&lt;br /&gt;
===What===&lt;br /&gt;
During this session, we will review an Online Movie Ticket Booking Application pulled from SourceForge for OWASP Top, specifically Cross-Site Scripting, SQL Injection and Access Control. You will learn how to review your code for these issues, how to fix them and how to automate the whole process. Expect lots of code, tools and fun (Please note that the exercises will be mainly in Java)&lt;br /&gt;
&lt;br /&gt;
===Who===&lt;br /&gt;
The tutorial will be given by Sherif Koussa. Sherif is the leader of our very own OWASP Ottawa, leader of Static Analysis Tools Evaluation Criteria at the Web Application Security Consortium (WASC) and a Steering Committee Member for SANS/GIAC GSSP-NET and GSSP-JAVA. He is also the founder of Software Secured (www.softwaresecured.com) and Secure Code Gurus (www.securecodegurus.com).&lt;br /&gt;
&lt;br /&gt;
===When===&lt;br /&gt;
The event is being planned for June 21st.. details to follow.&lt;br /&gt;
&lt;br /&gt;
===Where===&lt;br /&gt;
TBA&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Secure Code review&lt;br /&gt;
*(ISC)2 CSSLP introduction &lt;br /&gt;
*Metasploit introduction&lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
====May 2012====&lt;br /&gt;
'''Title:''' OWASP Tutorial Night: Threat Modeling Express&lt;br /&gt;
&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
'''Who:'''The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
'''When:''' The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
'''Where:''' Shopify have kindly offered the board room of their brand new location for the event. &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [http://www.scribd.com/doc/94372478/Threat-Model-Express?secret_password=wspz2g4rjvlob3bx2in Download Here] &lt;br /&gt;
&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=128848</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=128848"/>
				<updated>2012-04-30T14:46:58Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
| [[Image:RK_logo-rgb.jpg|300x150px|SS_logo.png|link=http://rigelksecurity.com]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Countermeasure 2012==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:cm_logo.png|300x150px|cm_logo.png|link=http://www.countermeasure2012.com]] &lt;br /&gt;
| OWASP Ottawa is proud to support the upcoming Countermeasure 2012 computer security conference right here in our home town. Check out their [http://www.countermeasure2012.com/ website] for more information and contact us with your OWASP membership number to receive a &amp;lt;b&amp;gt;10%&amp;lt;/b&amp;gt; discount. To get your discount code either sign up for our [http://lists.owasp.org/mailman/listinfo/owasp-ottawa mailing list] or contact one of the chapter affiliates directly with your OWASP membership number:  [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike]. See you there!&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==OWASP Tutorial Night: Threat Modeling Express==&lt;br /&gt;
Come join us for a night of free hands on tutorials exploring Threat Modeling Express. &lt;br /&gt;
&lt;br /&gt;
===What===&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
===Who===&lt;br /&gt;
The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
===When===&lt;br /&gt;
The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
===Where===&lt;br /&gt;
Shopify have kindly offered the board room of their brand new location for the event. They are [http://maps.google.com/maps/ms?hl=en&amp;amp;ptab=0&amp;amp;ie=UTF8&amp;amp;oe=UTF8&amp;amp;msa=0&amp;amp;msid=107573999073452164662.0004507f873d1bb28c2ee&amp;amp;ll=45.42707,-75.689621&amp;amp;spn=0.020722,0.027466&amp;amp;z=14&amp;amp;source=embed located in the heart of the Market] at 126 York Street.'&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=128847</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=128847"/>
				<updated>2012-04-30T14:45:58Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
| [[Image:RK_logo-rgb.jpg|300x150px|SS_logo.png|link=http://rigelkentsecurity.com]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Countermeasure 2012==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:cm_logo.png|300x150px|cm_logo.png|link=http://www.countermeasure2012.com]] &lt;br /&gt;
| OWASP Ottawa is proud to support the upcoming Countermeasure 2012 computer security conference right here in our home town. Check out their [http://www.countermeasure2012.com/ website] for more information and contact us with your OWASP membership number to receive a &amp;lt;b&amp;gt;10%&amp;lt;/b&amp;gt; discount. To get your discount code either sign up for our [http://lists.owasp.org/mailman/listinfo/owasp-ottawa mailing list] or contact one of the chapter affiliates directly with your OWASP membership number:  [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike]. See you there!&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==OWASP Tutorial Night: Threat Modeling Express==&lt;br /&gt;
Come join us for a night of free hands on tutorials exploring Threat Modeling Express. &lt;br /&gt;
&lt;br /&gt;
===What===&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
===Who===&lt;br /&gt;
The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
===When===&lt;br /&gt;
The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
===Where===&lt;br /&gt;
Shopify have kindly offered the board room of their brand new location for the event. They are [http://maps.google.com/maps/ms?hl=en&amp;amp;ptab=0&amp;amp;ie=UTF8&amp;amp;oe=UTF8&amp;amp;msa=0&amp;amp;msid=107573999073452164662.0004507f873d1bb28c2ee&amp;amp;ll=45.42707,-75.689621&amp;amp;spn=0.020722,0.027466&amp;amp;z=14&amp;amp;source=embed located in the heart of the Market] at 126 York Street.'&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=File:RK_logo-rgb.jpg&amp;diff=128845</id>
		<title>File:RK logo-rgb.jpg</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=File:RK_logo-rgb.jpg&amp;diff=128845"/>
				<updated>2012-04-30T14:44:42Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=128402</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=128402"/>
				<updated>2012-04-23T14:53:01Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
| [[Image:SS_logo.png|300x150px|SS_logo.png|link=http://softwaresecured.com]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==Your Local Chapter==&lt;br /&gt;
Hi Ottawa, welcome to your local OWASP chapter! We are a place to come and meet local developers and information security professionals, share ideas, and learn. We try to hold a meeting at least once every two months in the downtown core. We provide a mix of infosec rockstar talks, hands on training sessions, and special interest discussion groups. We are always looking for new ideas for events so let us know if you have an idea. Email one of us: [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike] or tweet at us [http://twitter.com/#!/owasp_ottawa owasp_ottawa].&lt;br /&gt;
&lt;br /&gt;
Hope to see you at a meeting soon.&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Countermeasure 2012==&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:cm_logo.png|300x150px|cm_logo.png|link=http://www.countermeasure2012.com]] &lt;br /&gt;
| OWASP Ottawa is proud to support the upcoming Countermeasure 2012 computer security conference right here in our home town. Check out their [http://www.countermeasure2012.com/ website] for more information and contact us with your OWASP membership number to receive a &amp;lt;b&amp;gt;10%&amp;lt;/b&amp;gt; discount. To get your discount code either sign up for our [http://lists.owasp.org/mailman/listinfo/owasp-ottawa mailing list] or contact one of the chapter affiliates directly with your OWASP membership number:  [mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei], [mailto:mike.sues@owasp.org Mike]. See you there!&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
==OWASP Tutorial Night: Threat Modeling Express==&lt;br /&gt;
Come join us for a night of free hands on tutorials exploring Threat Modeling Express. &lt;br /&gt;
&lt;br /&gt;
===What===&lt;br /&gt;
Threat Modeling Express is a lightweight threat modeling process suited for agile development environments. If you want to quickly add threat modeling to your development process without slowing it down this is the process for you. The evening will be composed of an interactive tutorial which will walk the participants through some examples using the The Modeling Express process.&lt;br /&gt;
&lt;br /&gt;
===Who===&lt;br /&gt;
The tutorial will be given by Rohit Sethi a software security specialist and Vice President of SD Elements. Rohit is a SANS course developer and instructor and leads the OWASP Design Patterns Security Analysis project.&lt;br /&gt;
&lt;br /&gt;
===When===&lt;br /&gt;
The event will start at 6PM on May 3, 2012.Please RSVP [http://www.eventbrite.com/event/3413274195 here]&lt;br /&gt;
&lt;br /&gt;
===Where===&lt;br /&gt;
Shopify have kindly offered the board room of their brand new location for the event. They are [http://maps.google.com/maps/ms?hl=en&amp;amp;ptab=0&amp;amp;ie=UTF8&amp;amp;oe=UTF8&amp;amp;msa=0&amp;amp;msid=107573999073452164662.0004507f873d1bb28c2ee&amp;amp;ll=45.42707,-75.689621&amp;amp;spn=0.020722,0.027466&amp;amp;z=14&amp;amp;source=embed located in the heart of the Market] at 126 York Street.'&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*&amp;lt;del&amp;gt;N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills)&amp;lt;/del&amp;gt; &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=125970</id>
		<title>Access Control Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=125970"/>
				<updated>2012-03-11T21:14:16Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Best Practice: Centralized ACL Controller */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing clear, simple, actionable guidance for providing Access Control security in your applications.&lt;br /&gt;
&lt;br /&gt;
==What is Access Control / Authorization?==&lt;br /&gt;
&lt;br /&gt;
Authorization is the process where requests to access a particular resource should be granted or denied. It should be noted that authorization is not equivalent to authentication - as these terms and their defininitions are frequently confused.&lt;br /&gt;
&lt;br /&gt;
Access Control is the method or mechanism of authorization to enfore that requests to a system resource or functionality should be granted.&lt;br /&gt;
&lt;br /&gt;
'''Role Based Access Control (RBAC)''' is commonly used to manage permissions within an application. Permissions are assigned to users in a many to many relationship.&lt;br /&gt;
&lt;br /&gt;
'''Discretioinary Access Control (DAC)''' is commonly used to manage permissions within an operating system.&lt;br /&gt;
&lt;br /&gt;
'''Mandatory Access Control (MAC)''' is a classification based system of objects and subjects. To &amp;quot;write up&amp;quot;, a subject's clearance level must be dominated by the object being written to the system. To &amp;quot;read down&amp;quot;, a subject's clearance level must govern the security level of the object being read. In this system, a subject may be able to write to an object, but will never be able to read it. This prevents malicious software from being able to leak data from different classification levels.  &amp;quot;Write up&amp;quot; prevents leakage from high to low. &lt;br /&gt;
(See the [http://csrc.nist.gov/publications/history/dod85.pdf Orange Book] for more information about classification levels and confidentiality controls in &amp;quot;DAC&amp;quot; and &amp;quot;MAC&amp;quot;.)&lt;br /&gt;
&lt;br /&gt;
=Attacks on Access Control=&lt;br /&gt;
&lt;br /&gt;
Vertical Access Control Attacks - A standard user accessing administration functionality&lt;br /&gt;
&lt;br /&gt;
Horizontal Access Control attacks - Same role, but accessing another user's private data&lt;br /&gt;
&lt;br /&gt;
Business Logic Access Control Attacks - Abuse of one or more linked activities that collectively realize a business objective&lt;br /&gt;
&lt;br /&gt;
=Access Control Issues=&lt;br /&gt;
*Many applications used the &amp;quot;All or Nothing&amp;quot; approach - Once authenticated, all users have equal privileges&lt;br /&gt;
&lt;br /&gt;
*Authorization Logic often relies on Security by Obscurity (STO) by assuming:&lt;br /&gt;
**Users will not find unlinked or hidden paths or functionality&lt;br /&gt;
**Users will not find and tamper with &amp;quot;obscured&amp;quot; client side parameters (i.e. &amp;quot;hidden&amp;quot; form fields, cookies, etc.)&lt;br /&gt;
	&lt;br /&gt;
*Applications with multiple permission levels/roles often increases the possibility of conflicting permission sets resulting in unanticipated privileges&lt;br /&gt;
&lt;br /&gt;
*Many administrative interfaces require only a password for authentication&lt;br /&gt;
*Shared accounts combined with a lack of auditing and logging make it extremely difficult to differentiate between malicious and honest administrators&lt;br /&gt;
*Administrative interfaces are often not designed as “secure” as user-level interfaces given the assumption that administrators are trusted users&lt;br /&gt;
*Authorization/Access Control relies on client-side information (e.g., hidden fields)&lt;br /&gt;
	&lt;br /&gt;
     &amp;lt;input type=&amp;quot;text&amp;quot; name=&amp;quot;fname&amp;quot; value=&amp;quot;Derek&amp;quot;&amp;gt;&lt;br /&gt;
     &amp;lt;input type=&amp;quot;text&amp;quot; name=&amp;quot;lname&amp;quot; value=&amp;quot;Jeter&amp;quot;&amp;gt;&lt;br /&gt;
     &amp;lt;input type=&amp;quot;hidden&amp;quot; name=&amp;quot;usertype&amp;quot; value=&amp;quot;admin&amp;quot;&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=Access Control Anti-Patterns=&lt;br /&gt;
&lt;br /&gt;
*Hard-coded role checks in application code&lt;br /&gt;
*Lack of centralized access control logic&lt;br /&gt;
*Untrusted data driving access control decisions&lt;br /&gt;
*Access control that is &amp;quot;open by default&amp;quot;&lt;br /&gt;
*Lack of addressing horizontal access control in a standardized way (if at all)&lt;br /&gt;
*Access control logic that needs to be manually added to every endpoint in code&lt;br /&gt;
&lt;br /&gt;
==Hard Coded Roles==&lt;br /&gt;
&lt;br /&gt;
  if (user.isManager() ||&lt;br /&gt;
      user.isAdministrator() ||&lt;br /&gt;
      user.isEditor() ||&lt;br /&gt;
      user.isUser()) {&lt;br /&gt;
      //execute action&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
'''Hard Codes Roles can create several issues including:'''&lt;br /&gt;
&lt;br /&gt;
*Making the policy of an application difficult to &amp;quot;prove&amp;quot; for audit or Q/A purposes &lt;br /&gt;
*Causing new code to be pushed each time an access control policy needs to be changed. &lt;br /&gt;
*They are fragile and easy to make mistakes&lt;br /&gt;
&lt;br /&gt;
==Order Specific Operations==&lt;br /&gt;
&lt;br /&gt;
Imagine the following parameters&lt;br /&gt;
&lt;br /&gt;
  http://example.com/buy?action=chooseDataPackage&lt;br /&gt;
  http://example.com/buy?action=customizePackage&lt;br /&gt;
  http://example.com/buy?action=makePayment&lt;br /&gt;
  http://example.com/buy?action=downloadData&lt;br /&gt;
&lt;br /&gt;
'''Can an attacker control the sequence?'''&lt;br /&gt;
&lt;br /&gt;
'''Can an attacker abuse this with concurency?'''&lt;br /&gt;
&lt;br /&gt;
==Never Depend on Untrusted Data==&lt;br /&gt;
&lt;br /&gt;
*Never trust user data for access control decisions&lt;br /&gt;
*Never make access control decisions in JavaScript&lt;br /&gt;
*Never depend on the order of values sent from the client&lt;br /&gt;
*Never make authorization decisions based solely on&lt;br /&gt;
**hidden fields&lt;br /&gt;
**cookie values&lt;br /&gt;
**form parameters&lt;br /&gt;
**URL parameters&lt;br /&gt;
**anything else from the request&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=Attacking Access Controls=&lt;br /&gt;
&lt;br /&gt;
*Elevation of privileges&lt;br /&gt;
*Disclosure of confidential data - Compromising admin-level accounts often result in access to a user's confidential data&lt;br /&gt;
*Data tampering - Privilege levels do not distinguish users who can only view data and users permitted to modify data&lt;br /&gt;
&lt;br /&gt;
=Testing for Broken Access Control=&lt;br /&gt;
&lt;br /&gt;
*Attempt to access administrative components or functions as an anonymous or regular user&lt;br /&gt;
**Scour HTML source for “interesting” hidden form fields&lt;br /&gt;
**Test web accessible directory structure for names like admin, administrator, manager, etc (i.e. attempt to directly browse to “restricted” areas)&lt;br /&gt;
*Determine how administrators are authenticated. Ensure that adequate authentication is used and enforced&lt;br /&gt;
*For each user role, ensure that only the appropriate pages or components are accessible for that role.&lt;br /&gt;
*Login as a low-level user, browse history for a higher level user’s cache, load the page to see if the original authorization is passed to a previous session.&lt;br /&gt;
*If able to compromise administrator-level account, test for all other common web application vulnerabilities (poor input validation, privileged database access, etc)&lt;br /&gt;
&lt;br /&gt;
=Defenses Against Access Control Attacks=&lt;br /&gt;
&lt;br /&gt;
*Implement role based access control to assign permissions to application users for vertical access control requirements&lt;br /&gt;
*Implement data-contextual access control to assign permissions to application users in the context of specific data items for horizontal access control requirements&lt;br /&gt;
*Avoid assigning permissions on a per-user basis&lt;br /&gt;
*Perform consistent authorization checking routines on all application pages&lt;br /&gt;
*Where applicable, apply DENY privileges last, issue ALLOW privileges on a case-by-case basis&lt;br /&gt;
*Where possible restrict administrator access to machines located on the local area network (i.e. it’s best to avoid remote administrator access from public facing access points)&lt;br /&gt;
*Log all failed access authorization requests to a secure location for review by administrators&lt;br /&gt;
*Perform reviews of failed login attempts on a periodic basis&lt;br /&gt;
*Utilize the strengths and functionality provided by the SSO solution you chose&lt;br /&gt;
&lt;br /&gt;
=Best Practices=&lt;br /&gt;
&lt;br /&gt;
==Best Practice: Code to the Activity==&lt;br /&gt;
&lt;br /&gt;
   if (AC.hasAccess(ARTICLE_EDIT)) {&lt;br /&gt;
       //execute activity&lt;br /&gt;
   }&lt;br /&gt;
*Code it once, never needs to change again&lt;br /&gt;
*Implies policy is persisted/centralized in some way&lt;br /&gt;
*Avoid assigning permissions on a per-user basis&lt;br /&gt;
*Requires more design/work up front to get right&lt;br /&gt;
&lt;br /&gt;
==Best Practice: Centralized ACL Controller==&lt;br /&gt;
&lt;br /&gt;
*Define a centralized access controller&lt;br /&gt;
      ACLService.isAuthorized(ACTION_CONSTANT)&lt;br /&gt;
      ACLService.assertAuthorized(ACTION_CONSTANT)&lt;br /&gt;
*Access control decisions go through these simple API’s&lt;br /&gt;
*Centralized logic to drive policy behavior and persistence&lt;br /&gt;
*May contain data-driven access control policy information&lt;br /&gt;
*Policy language needs to support ability to express both access rights and prohibitions&lt;br /&gt;
&lt;br /&gt;
==Best Practice: Using a Centralized Access Controller==&lt;br /&gt;
&lt;br /&gt;
*In Presentation Layer&lt;br /&gt;
&lt;br /&gt;
       if (isAuthorized(VIEW_LOG_PANEL))&lt;br /&gt;
       {&lt;br /&gt;
          Here are the logs&lt;br /&gt;
          &amp;lt;%=getLogs();%/&amp;gt;&lt;br /&gt;
       }&lt;br /&gt;
	&lt;br /&gt;
*In Controller&lt;br /&gt;
&lt;br /&gt;
       try (assertAuthorized(DELETE_USER))&lt;br /&gt;
       {&lt;br /&gt;
          deleteUser();&lt;br /&gt;
       }&lt;br /&gt;
&lt;br /&gt;
==Best Practice: Verifying policy server-side==&lt;br /&gt;
&lt;br /&gt;
*Keep user identity verification in session&lt;br /&gt;
*Load entitlements server side from trusted sources&lt;br /&gt;
*Force authorization checks on ALL requests&lt;br /&gt;
**JS file, image, AJAX and FLASH requests as well!&lt;br /&gt;
**Force this check using a filter if possible&lt;br /&gt;
&lt;br /&gt;
=SQL Integrated Access Control=&lt;br /&gt;
&lt;br /&gt;
'''Example Feature'''&lt;br /&gt;
&lt;br /&gt;
    http://mail.example.com/viewMessage?msgid=2356342&lt;br /&gt;
&lt;br /&gt;
'''This SQL would be vulnerable to tampering'''&lt;br /&gt;
&lt;br /&gt;
  select * from messages where messageid = 2356342&lt;br /&gt;
&lt;br /&gt;
'''Ensure the owner is referenced in the query!'''&lt;br /&gt;
&lt;br /&gt;
  select * from messages where messageid = 2356342 AND messages.message_owner = &lt;br /&gt;
&lt;br /&gt;
=Access Control Positive Patterns=&lt;br /&gt;
&lt;br /&gt;
*Code to the activity, not the role&lt;br /&gt;
*Centralize access control logic&lt;br /&gt;
*Design access control as a filter&lt;br /&gt;
*Deny by default, fail securely&lt;br /&gt;
*Build centralized access control mechanism&lt;br /&gt;
*Apply same core logic to presentation and server-side access control decisions&lt;br /&gt;
*Determine access control through Server-side trusted data&lt;br /&gt;
&lt;br /&gt;
=Data Contextual Access Control=&lt;br /&gt;
&lt;br /&gt;
'''Data Contextual / Horizontal Access Control API examples'''&lt;br /&gt;
&lt;br /&gt;
    ACLService.isAuthorized(EDIT_ORG, 142)&lt;br /&gt;
    ACLService.assertAuthorized(VIEW_ORG, 900)&lt;br /&gt;
&lt;br /&gt;
Long Form&lt;br /&gt;
&lt;br /&gt;
    isAuthorized(user, EDIT_ORG, Organization.class, 14)&lt;br /&gt;
	&lt;br /&gt;
*Essentially checking if the user has the right role in the context of a specific object&lt;br /&gt;
*Centralize access control logic&lt;br /&gt;
*Protecting data at the lowest level!&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Jim Manico = jim [manico] dot net&lt;br /&gt;
&lt;br /&gt;
Fred Donovan - fred.donovan [at] owasp dot org&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=125934</id>
		<title>Access Control Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=125934"/>
				<updated>2012-03-11T17:30:46Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing clear, simple, actionable guidance for providing Access Control security in your applications.&lt;br /&gt;
&lt;br /&gt;
==What is Access Control / Authorization?==&lt;br /&gt;
&lt;br /&gt;
Authorization is the process where requests to access a particular resource should be granted or denied. It should be noted that authorization is not equivalent to authentication - as these terms and their defininitions are frequently confused.&lt;br /&gt;
&lt;br /&gt;
Access Control is the method or mechanism of authorization to enfore that requests to a system resource or functionality should be granted.&lt;br /&gt;
&lt;br /&gt;
'''Role Based Access Control (RBAC)''' is commonly used to manage permissions within an application. Permissions are assigned to users in a many to many relationship.&lt;br /&gt;
&lt;br /&gt;
'''Discretioinary Access Control (DAC)''' is commonly used to manage permissions within an application.&lt;br /&gt;
&lt;br /&gt;
'''Mandatory Access Control (MAC)''' is a classification based system of objects and subjects. To &amp;quot;write up&amp;quot;, a subject's clearance level must be&lt;br /&gt;
&lt;br /&gt;
=Attacks on Access Control=&lt;br /&gt;
&lt;br /&gt;
Vertical Access Control Attacks - A standard user accessing administration functionality&lt;br /&gt;
&lt;br /&gt;
Horizontal Access Control attacks - Same role, but accessing another user's private data&lt;br /&gt;
&lt;br /&gt;
Business Logic Access Control Attacks - Abuse of one or more linked activities that collectively realize a business objective&lt;br /&gt;
&lt;br /&gt;
=Access Control Issues=&lt;br /&gt;
*Many applications used the &amp;quot;All or Nothing&amp;quot; approach - Once authenticated, all users have equal privileges&lt;br /&gt;
&lt;br /&gt;
*Authorization Logic often relies on Security by Obscurity (STO) by assuming:&lt;br /&gt;
**Users will not find unlinked or hidden paths or functionality&lt;br /&gt;
**Users will not find and tamper with &amp;quot;obscured&amp;quot; client side parameters (i.e. &amp;quot;hidden&amp;quot; form fields, cookies, etc.)&lt;br /&gt;
	&lt;br /&gt;
*Applications with multiple permission levels/roles often increases the possibility of conflicting permission sets resulting in unanticipated privileges&lt;br /&gt;
&lt;br /&gt;
*Many administrative interfaces require only a password for authentication&lt;br /&gt;
*Shared accounts combined with a lack of auditing and logging make it extremely difficult to differentiate between malicious and honest administrators&lt;br /&gt;
*Administrative interfaces are often not designed as “secure” as user-level interfaces given the assumption that administrators are trusted users&lt;br /&gt;
*Authorization/Access Control relies on client-side information (e.g., hidden fields)&lt;br /&gt;
	&lt;br /&gt;
     input type=&amp;quot;text&amp;quot; name=&amp;quot;fname&amp;quot; value=&amp;quot;Derek&amp;quot;&lt;br /&gt;
     input type=&amp;quot;text&amp;quot; name=&amp;quot;lname&amp;quot; value=&amp;quot;Jeter&amp;quot;&lt;br /&gt;
     input type=&amp;quot;hidden&amp;quot; name=&amp;quot;usertype&amp;quot; value=&amp;quot;admin&amp;quot;&lt;br /&gt;
&lt;br /&gt;
=Access Control Anti-Patterns=&lt;br /&gt;
&lt;br /&gt;
*Hard-coded role checks in application code&lt;br /&gt;
*Lack of centralized access control logic&lt;br /&gt;
*Untrusted data driving access control decisions&lt;br /&gt;
*Access control that is &amp;quot;open by default&amp;quot;&lt;br /&gt;
*Lack of addressing horizontal access control in a standardized way (if at all)&lt;br /&gt;
*Access control logic that needs to be manually added to every endpoint in code&lt;br /&gt;
&lt;br /&gt;
==Hard Coded Roles==&lt;br /&gt;
&lt;br /&gt;
  if (user.isManager() ||&lt;br /&gt;
      user.isAdministrator() ||&lt;br /&gt;
      user.isEditor() ||&lt;br /&gt;
      user.isUser()) {&lt;br /&gt;
      //execute action&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
'''Hard Codes Roles can create several issues including:'''&lt;br /&gt;
&lt;br /&gt;
*Making the policy of an application difficult to &amp;quot;prove&amp;quot; for audit or Q/A purposes &lt;br /&gt;
*Causing new code to be pushed each time an access control policy needs to be changed. &lt;br /&gt;
*They are fragile and easy to make mistakes Order Specific Operations&lt;br /&gt;
&lt;br /&gt;
==Order Specific Operations==&lt;br /&gt;
&lt;br /&gt;
Imagine the following parameters&lt;br /&gt;
&lt;br /&gt;
  http://example.com/buy?action=chooseDataPackage&lt;br /&gt;
  http://example.com/buy?action=customizePackage&lt;br /&gt;
  http://example.com/buy?action=makePayment&lt;br /&gt;
  http://example.com/buy?action=downloadData&lt;br /&gt;
&lt;br /&gt;
'''Can an attacker control the sequence?'''&lt;br /&gt;
&lt;br /&gt;
'''Can an attacker abuse this with concurency?'''&lt;br /&gt;
&lt;br /&gt;
==Never Depend on Untrusted Data==&lt;br /&gt;
&lt;br /&gt;
*Never trust user data for access control decisions&lt;br /&gt;
*Never make access control decisions in JavaScript&lt;br /&gt;
*Never depend on the order of values sent from the client&lt;br /&gt;
*Never make authorization decisions based solely on&lt;br /&gt;
**hidden fields&lt;br /&gt;
**cookie values&lt;br /&gt;
**form parameters&lt;br /&gt;
**URL parameters&lt;br /&gt;
**anything else from the request&lt;br /&gt;
 &lt;br /&gt;
&lt;br /&gt;
=Attacking Access Controls=&lt;br /&gt;
&lt;br /&gt;
*Elevation of privileges&lt;br /&gt;
*Disclosure of confidential data - Compromising admin-level accounts often result in access to a user's confidential data&lt;br /&gt;
*Data tampering - Privilege levels do not distinguish users who can only view data and users permitted to modify data&lt;br /&gt;
&lt;br /&gt;
=Testing for Broken Access Control=&lt;br /&gt;
&lt;br /&gt;
*Attempt to access administrative components or functions as an anonymous or regular user&lt;br /&gt;
**Scour HTML source for “interesting” hidden form fields&lt;br /&gt;
**Test web accessible directory structure for names like admin, administrator, manager, etc (i.e. attempt to directly browse to “restricted” areas)&lt;br /&gt;
*Determine how administrators are authenticated. Ensure that adequate authentication is used and enforced&lt;br /&gt;
*For each user role, ensure that only the appropriate pages or components are accessible for that role.&lt;br /&gt;
*Login as a low-level user, browse history for a higher level user’s cache, load the page to see if the original authorization is passed to a previous session.&lt;br /&gt;
*If able to compromise administrator-level account, test for all other common web application vulnerabilities (poor input validation, privileged database access, etc)&lt;br /&gt;
&lt;br /&gt;
=Defenses Against Access Control Attacks=&lt;br /&gt;
&lt;br /&gt;
*Implement role based access control to assign permissions to application users for vertical access control requirements&lt;br /&gt;
*Implement data-contextual access control to assign permissions to application users in the context of specific data items for horizontal access control requirements&lt;br /&gt;
*Avoid assigning permissions on a per-user basis&lt;br /&gt;
*Perform consistent authorization checking routines on all application pages&lt;br /&gt;
*Where applicable, apply DENY privileges last, issue ALLOW privileges on a case-by-case basis&lt;br /&gt;
*Where possible restrict administrator access to machines located on the local area network (i.e. it’s best to avoid remote administrator access from public facing access points)&lt;br /&gt;
*Log all failed access authorization requests to a secure location for review by administrators&lt;br /&gt;
*Perform reviews of failed login attempts on a periodic basis&lt;br /&gt;
*Utilize the strengths and functionality provided by the SSO solution you chose&lt;br /&gt;
&lt;br /&gt;
=Best Practices=&lt;br /&gt;
&lt;br /&gt;
==Best Practice: Code to the Activity==&lt;br /&gt;
&lt;br /&gt;
   if (AC.hasAccess(ARTICLE_EDIT)) {&lt;br /&gt;
       //execute activity&lt;br /&gt;
   }&lt;br /&gt;
*Code it once, never needs to change again&lt;br /&gt;
*Implies policy is persisted/centralized in some way&lt;br /&gt;
*Avoid assigning permissions on a per-user basis&lt;br /&gt;
*Requires more design/work up front to get right&lt;br /&gt;
&lt;br /&gt;
==Best Practice: Centralized ACL Controller==&lt;br /&gt;
&lt;br /&gt;
*Define a centralized access controller&lt;br /&gt;
	ACLService.isAuthorized(ACTION_CONSTANT)&lt;br /&gt;
	ACLService.assertAuthorized(ACTION_CONSTANT)&lt;br /&gt;
*Access control decisions go through these simple API’s&lt;br /&gt;
*Centralized logic to drive policy behavior and persistence&lt;br /&gt;
*May contain data-driven access control policy information&lt;br /&gt;
*Policy language needs to support ability to express both access rights and prohibitions&lt;br /&gt;
&lt;br /&gt;
==Best Practice: Using a Centralized Access Controller==&lt;br /&gt;
&lt;br /&gt;
*In Presentation Layer&lt;br /&gt;
&lt;br /&gt;
       if (isAuthorized(VIEW_LOG_PANEL))&lt;br /&gt;
       {&lt;br /&gt;
          Here are the logs&lt;br /&gt;
          &amp;lt;%=getLogs();%/&amp;gt;&lt;br /&gt;
       }&lt;br /&gt;
	&lt;br /&gt;
*In Controller&lt;br /&gt;
&lt;br /&gt;
       try (assertAuthorized(DELETE_USER))&lt;br /&gt;
       {&lt;br /&gt;
          deleteUser();&lt;br /&gt;
       }&lt;br /&gt;
&lt;br /&gt;
==Best Practice: Verifying policy server-side==&lt;br /&gt;
&lt;br /&gt;
*Keep user identity verification in session&lt;br /&gt;
*Load entitlements server side from trusted sources&lt;br /&gt;
*Force authorization checks on ALL requests&lt;br /&gt;
**JS file, image, AJAX and FLASH requests as well!&lt;br /&gt;
**Force this check using a filter if possible&lt;br /&gt;
&lt;br /&gt;
=SQL Integrated Access Control=&lt;br /&gt;
&lt;br /&gt;
'''Example Feature'''&lt;br /&gt;
&lt;br /&gt;
    http://mail.example.com/viewMessage?msgid=2356342&lt;br /&gt;
&lt;br /&gt;
'''This SQL would be vulnerable to tampering'''&lt;br /&gt;
&lt;br /&gt;
  select * from messages where messageid = 2356342&lt;br /&gt;
&lt;br /&gt;
'''Ensure the owner is referenced in the query!'''&lt;br /&gt;
&lt;br /&gt;
  select * from messages where messageid = 2356342 AND messages.message_owner = &lt;br /&gt;
&lt;br /&gt;
=Access Control Positive Patterns=&lt;br /&gt;
&lt;br /&gt;
*Code to the activity, not the role&lt;br /&gt;
*Centralize access control logic&lt;br /&gt;
*Design access control as a filter&lt;br /&gt;
*Deny by default, fail securely&lt;br /&gt;
*Build centralized access control mechanism&lt;br /&gt;
*Apply same core logic to presentation and server-side access control decisions&lt;br /&gt;
*Determine access control through Server-side trusted data&lt;br /&gt;
&lt;br /&gt;
=Data Contextual Access Control=&lt;br /&gt;
&lt;br /&gt;
'''Data Contextual / Horizontal Access Control API examples'''&lt;br /&gt;
&lt;br /&gt;
    ACLService.isAuthorized(EDIT_ORG, 142)&lt;br /&gt;
    ACLService.assertAuthorized(VIEW_ORG, 900)&lt;br /&gt;
&lt;br /&gt;
Long Form&lt;br /&gt;
&lt;br /&gt;
    isAuthorized(user, EDIT_ORG, Organization.class, 14)&lt;br /&gt;
	&lt;br /&gt;
*Essentially checking if the user has the right role in the context of a specific object&lt;br /&gt;
*Centralize access control logic&lt;br /&gt;
*Protecting data a the lowest level!&lt;br /&gt;
&lt;br /&gt;
=Authors and Primary Editors=&lt;br /&gt;
&lt;br /&gt;
Jim Manico = jim [manico] dot net&lt;br /&gt;
&lt;br /&gt;
Fred Donovan - fred.donovan [at] owasp dot org&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=125912</id>
		<title>Access Control Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=125912"/>
				<updated>2012-03-11T04:23:59Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: /* Access Control Issues */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing clear, simple, actionable guidance for providing Access Control security in your applications.&lt;br /&gt;
&lt;br /&gt;
==What is Access Control / Authorization?==&lt;br /&gt;
&lt;br /&gt;
Authorization is the process where requests to access a particular resource should be granted or denied. It should be noted that authorization is not equivalent to authentication - as these terms and their defininitions are frequently confused.&lt;br /&gt;
&lt;br /&gt;
Access Control is the method or mechanism of authorization to enfore that requests to a system resource or functionality should be granted.&lt;br /&gt;
&lt;br /&gt;
'''Role Based Access Control (RBAC)''' is commonly used to manage permissions within an application. Permissions are assigned to users in a many to many relationship.&lt;br /&gt;
&lt;br /&gt;
'''Discretioinary Access Control (DAC)''' is commonly used to manage permissions within an application.&lt;br /&gt;
&lt;br /&gt;
'''Mandatory Access Control (MAC)''' is a classification based system of objects and subjects. To &amp;quot;write up&amp;quot;, a subject's clearance level must be&lt;br /&gt;
&lt;br /&gt;
==Attacks on Access Control==&lt;br /&gt;
&lt;br /&gt;
Vertical Access Control Attacks - A standard user accessing administration functionality&lt;br /&gt;
&lt;br /&gt;
Horizontal Access Control attacks - Same role, but accessing another user's private data&lt;br /&gt;
&lt;br /&gt;
Business Logic Access Control Attacks - Abuse of one or more linked activities that collectively realize a business objective&lt;br /&gt;
&lt;br /&gt;
==Access Control Issues==&lt;br /&gt;
&lt;br /&gt;
Many applications used the &amp;quot;All or Nothing&amp;quot; approach - Once authenticated, all users have equal privileges&lt;br /&gt;
&lt;br /&gt;
Authorization Logic often relies on Security by Obscurity (STO) by assuming:&lt;br /&gt;
&lt;br /&gt;
*Users will not find unlinked or hidden paths or functionality&lt;br /&gt;
*Users will not find and tamper with &amp;quot;obscured&amp;quot; client side parameters (i.e. &amp;quot;hidden&amp;quot; form fields, cookies, etc.)&lt;br /&gt;
	&lt;br /&gt;
Applications with multiple permission levels/roles often increases the possibility of conflicting permission sets resulting in unanticipated privileges&lt;br /&gt;
&lt;br /&gt;
'''Access Control Anti-Patterns'''&lt;br /&gt;
&lt;br /&gt;
*Hard-coded role checks in application code&lt;br /&gt;
*Lack of centralized access control logic&lt;br /&gt;
*Untrusted data driving access control decisions&lt;br /&gt;
*Access control that is &amp;quot;open by default&amp;quot;&lt;br /&gt;
*Lack of addressing horizontal access control in a standardized way (if at all)&lt;br /&gt;
*Access control logic that needs to be manually added to every endpoint in code&lt;br /&gt;
*Hard Coded Roles&lt;br /&gt;
&lt;br /&gt;
  if (user.isManager() ||&lt;br /&gt;
      user.isAdministrator() ||&lt;br /&gt;
      user.isEditor() ||&lt;br /&gt;
      user.isUser()) {&lt;br /&gt;
      //execute action&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
'''Hard Codes Roles can create several issues including:'''&lt;br /&gt;
&lt;br /&gt;
Making the policy of an application difficult to &amp;quot;prove&amp;quot; for audit or Q/A purposes causing new code to be pushed each time an access control policy needs to be changed. They are fragile and easy to make mistakes Order Specific Operations&lt;br /&gt;
&lt;br /&gt;
Imagine the following parameters&lt;br /&gt;
&lt;br /&gt;
  http://example.com/buy?action=chooseDataPackage&lt;br /&gt;
  http://example.com/buy?action=customizePackage&lt;br /&gt;
  http://example.com/buy?action=makePayment&lt;br /&gt;
  http://example.com/buy?action=downloadData&lt;br /&gt;
&lt;br /&gt;
Can an attacker control the sequence?&lt;br /&gt;
&lt;br /&gt;
Can an attacker abuse this with concurency?&lt;br /&gt;
&lt;br /&gt;
Never Depend on Untrusted Data&lt;br /&gt;
&lt;br /&gt;
Never trust user data for access control decisions&lt;br /&gt;
Never make access control decisions in JavaScript&lt;br /&gt;
Never depend on the order of values sent from the client&lt;br /&gt;
Never make authorization decisions based solely on&lt;br /&gt;
*hidden fields&lt;br /&gt;
*cookie values&lt;br /&gt;
*form parameters&lt;br /&gt;
*URL parameters&lt;br /&gt;
*anything else from the request&lt;br /&gt;
 &lt;br /&gt;
'''Access Control Issues'''&lt;br /&gt;
&lt;br /&gt;
Many administrative interfaces require only a password for authentication&lt;br /&gt;
Shared accounts combined with a lack of auditing and logging make it extremely difficult to differentiate between malicious and honest administrators&lt;br /&gt;
Administrative interfaces are often not designed as “secure” as user-level interfaces given the assumption that administrators are trusted users&lt;br /&gt;
Authorization/Access Control relies on client-side information (e.g., hidden fields)&lt;br /&gt;
	&lt;br /&gt;
     input type=&amp;quot;text&amp;quot; name=&amp;quot;fname&amp;quot; value=&amp;quot;Derek&amp;quot;&lt;br /&gt;
     input type=&amp;quot;text&amp;quot; name=&amp;quot;lname&amp;quot; value=&amp;quot;Jeter&amp;quot;&lt;br /&gt;
     input type=&amp;quot;hidden&amp;quot; name=&amp;quot;usertype&amp;quot; value=&amp;quot;admin&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Attacking Access Controls'''&lt;br /&gt;
&lt;br /&gt;
*Elevation of privileges&lt;br /&gt;
*Disclosure of confidential data - Compromising admin-level accounts often result in access to a user's confidential data&lt;br /&gt;
*Data tampering - Privilege levels do not distinguish users who can only view data and users permitted to modify data&lt;br /&gt;
*Testing for Broken Access Control&lt;br /&gt;
&lt;br /&gt;
Attempt to access administrative components or functions as an anonymous or regular user&lt;br /&gt;
*Scour HTML source for “interesting” hidden form fields&lt;br /&gt;
*Test web accessible directory structure for names like admin, administrator, manager, etc (i.e. attempt to directly browse to “restricted” areas)&lt;br /&gt;
&lt;br /&gt;
Determine how administrators are authenticated. &lt;br /&gt;
Ensure that adequate authentication is used and enforced&lt;br /&gt;
For each user role, ensure that only the appropriate pages or components are accessible for that role.&lt;br /&gt;
Login as a low-level user, browse history for a higher level user’s cache, load the page to see if the original authorization is passed to a previous session.&lt;br /&gt;
If able to compromise administrator-level account, test for all other common web application vulnerabilities (poor input validation, privileged database access, etc)&lt;br /&gt;
Defenses Against Access Control Attacks&lt;br /&gt;
&lt;br /&gt;
Implement role based access control to assign permissions to application users for vertical access control requirements&lt;br /&gt;
Implement data-contextual access control to assign permissions to application users in the context of specific data items for horizontal access control requirements&lt;br /&gt;
Avoid assigning permissions on a per-user basis&lt;br /&gt;
Perform consistent authorization checking routines on all application pages&lt;br /&gt;
Where applicable, apply DENY privileges last, issue ALLOW privileges on a case-by-case basis&lt;br /&gt;
Where possible restrict administrator access to machines located on the local area network (i.e. it’s best to avoid remote administrator access from public facing access points)&lt;br /&gt;
Log all failed access authorization requests to a secure location for review by administrators&lt;br /&gt;
Perform reviews of failed login attempts on a periodic basis&lt;br /&gt;
Utilize the strengths and functionality provided by the SSO solution you chose&lt;br /&gt;
Best Practice: Code to the Activity&lt;br /&gt;
&lt;br /&gt;
   if (AC.hasAccess(ARTICLE_EDIT)) {&lt;br /&gt;
       //execute activity&lt;br /&gt;
   }&lt;br /&gt;
Code it once, never needs to change again&lt;br /&gt;
Implies policy is persisted/centralized in some way&lt;br /&gt;
Avoid assigning permissions on a per-user basis&lt;br /&gt;
Requires more design/work up front to get right&lt;br /&gt;
Best Practice: Centralized ACL Controler&lt;br /&gt;
&lt;br /&gt;
Define a centralized access controller&lt;br /&gt;
	ACLService.isAuthorized(ACTION_CONSTANT)&lt;br /&gt;
	ACLService.assertAuthorized(ACTION_CONSTANT)&lt;br /&gt;
Access control decisions go through these simple API’s&lt;br /&gt;
Centralized logic to drive policy behavior and persistence&lt;br /&gt;
May contain data-driven access control policy information&lt;br /&gt;
Policy language needs to support ability to express both access rights and prohibitions&lt;br /&gt;
Best Practice: Using a Centralized Access Controller&lt;br /&gt;
&lt;br /&gt;
      In Presentation Layer&lt;br /&gt;
       if (isAuthorized(VIEW_LOG_PANEL))&lt;br /&gt;
       {&lt;br /&gt;
          Here are the logs&lt;br /&gt;
          &amp;lt;%=getLogs();%/&amp;gt;&lt;br /&gt;
       }	&lt;br /&gt;
       In Controller&lt;br /&gt;
       try (assertAuthorized(DELETE_USER))&lt;br /&gt;
       {&lt;br /&gt;
          deleteUser();&lt;br /&gt;
       }&lt;br /&gt;
&lt;br /&gt;
Best Practice: &lt;br /&gt;
&lt;br /&gt;
Verifying policy server-side&lt;br /&gt;
Keep user identity verification in session&lt;br /&gt;
Load entitlements server side from trusted sources&lt;br /&gt;
Force authorization checks on ALL requests&lt;br /&gt;
*JS file, image, AJAX and FLASH requests as well!&lt;br /&gt;
*Force this check using a filter if possible&lt;br /&gt;
SQL Integrated Access Control&lt;br /&gt;
&lt;br /&gt;
Example Feature&lt;br /&gt;
&lt;br /&gt;
    http://mail.example.com/viewMessage?msgid=2356342&lt;br /&gt;
&lt;br /&gt;
This SQL would be vulnerable to tampering&lt;br /&gt;
&lt;br /&gt;
  select * from messages where messageid = 2356342&lt;br /&gt;
  Ensure the owner is referenced in the query!&lt;br /&gt;
  select * from messages where messageid = 2356342 AND messages.message_owner = &lt;br /&gt;
 Access Control Positive Patterns&lt;br /&gt;
&lt;br /&gt;
Code to the activity, not the role&lt;br /&gt;
Centralize access control logic&lt;br /&gt;
Design access control as a filter&lt;br /&gt;
Deny by default, fail securely&lt;br /&gt;
Build centralized access control mechanism&lt;br /&gt;
Apply same core logic to presentation and server-side access control decisions&lt;br /&gt;
Determine access control through Server-side trusted data&lt;br /&gt;
Data Contextual Access Control&lt;br /&gt;
&lt;br /&gt;
Data Contextual / Horizontal Access Control API examples&lt;br /&gt;
&lt;br /&gt;
    ACLService.isAuthorized(EDIT_ORG, 142)&lt;br /&gt;
    ACLService.assertAuthorized(VIEW_ORG, 900)&lt;br /&gt;
&lt;br /&gt;
Long Form&lt;br /&gt;
&lt;br /&gt;
    isAuthorized(user, EDIT_ORG, Organization.class, 14)&lt;br /&gt;
	&lt;br /&gt;
Essentially checking if the user has the right role in the context of a specific object&lt;br /&gt;
Centralize access control logic&lt;br /&gt;
Protecting data a the lowest level!&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=125911</id>
		<title>Access Control Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=125911"/>
				<updated>2012-03-11T04:13:53Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing clear, simple, actionable guidance for providing Access Control security in your applications.&lt;br /&gt;
&lt;br /&gt;
==What is Access Control / Authorization?==&lt;br /&gt;
&lt;br /&gt;
Authorization is the process where requests to access a particular resource should be granted or denied. It should be noted that authorization is not equivalent to authentication - as these terms and their defininitions are frequently confused.&lt;br /&gt;
&lt;br /&gt;
Access Control is the method or mechanism of authorization to enfore that requests to a system resource or functionality should be granted.&lt;br /&gt;
&lt;br /&gt;
'''Role Based Access Control (RBAC)''' is commonly used to manage permissions within an application. Permissions are assigned to users in a many to many relationship.&lt;br /&gt;
&lt;br /&gt;
'''Discretioinary Access Control (DAC)''' is commonly used to manage permissions within an application.&lt;br /&gt;
&lt;br /&gt;
'''Mandatory Access Control (MAC)''' is a classification based system of objects and subjects. To &amp;quot;write up&amp;quot;, a subject's clearance level must be&lt;br /&gt;
&lt;br /&gt;
==Attacks on Access Control==&lt;br /&gt;
&lt;br /&gt;
Vertical Access Control Attacks - A standard user accessing administration functionality&lt;br /&gt;
&lt;br /&gt;
Horizontal Access Control attacks - Same role, but accessing another user's private data&lt;br /&gt;
&lt;br /&gt;
Business Logic Access Control Attacks - Abuse of one or more linked activities that collectively realize a business objective&lt;br /&gt;
&lt;br /&gt;
==Access Control Issues==&lt;br /&gt;
&lt;br /&gt;
Many applications used the &amp;quot;All or Nothing&amp;quot; approach - Once authenticated, all users have equal privileges&lt;br /&gt;
&lt;br /&gt;
Authorization Logic often relies on Security by Obscurity (STO) by assuming:&lt;br /&gt;
&lt;br /&gt;
*Users will not find unlinked or hidden paths or functionality&lt;br /&gt;
*Users will not find and tamper with &amp;quot;obscured&amp;quot; client side parameters (i.e. &amp;quot;hidden&amp;quot; form fields, cookies, etc.)&lt;br /&gt;
	&lt;br /&gt;
Applications with multiple permission levels/roles often increases the possibility of conflicting permission sets resulting in unanticipated privileges&lt;br /&gt;
&lt;br /&gt;
'''Access Control Anti-Patterns'''&lt;br /&gt;
&lt;br /&gt;
*Hard-coded role checks in application code&lt;br /&gt;
*Lack of centralized access control logic&lt;br /&gt;
*Untrusted data driving access control decisions&lt;br /&gt;
*Access control that is &amp;quot;open by default&amp;quot;&lt;br /&gt;
*Lack of addressing horizontal access control in a standardized way (if at all)&lt;br /&gt;
*Access control logic that needs to be manually added to every endpoint in code&lt;br /&gt;
*Hard Coded Roles&lt;br /&gt;
&lt;br /&gt;
  if (user.isManager() ||&lt;br /&gt;
		user.isAdministrator() ||&lt;br /&gt;
		user.isEditor() ||&lt;br /&gt;
		user.isUser()) {&lt;br /&gt;
  //execute action&lt;br /&gt;
  }&lt;br /&gt;
&lt;br /&gt;
'''Hard Codes Roles can create several issues including:'''&lt;br /&gt;
&lt;br /&gt;
Making the policy of an application difficult to &amp;quot;prove&amp;quot; for audit or Q/A purposes causing new code to be pushed each time an access control policy needs to be changed. They are fragile and easy to make mistakes Order Specific Operations&lt;br /&gt;
&lt;br /&gt;
Imagine the following parameters&lt;br /&gt;
&lt;br /&gt;
  http://example.com/buy?action=chooseDataPackage&lt;br /&gt;
  http://example.com/buy?action=customizePackage&lt;br /&gt;
  http://example.com/buy?action=makePayment&lt;br /&gt;
  http://example.com/buy?action=downloadData&lt;br /&gt;
&lt;br /&gt;
Can an attacker control the sequence?&lt;br /&gt;
&lt;br /&gt;
Can an attacker abuse this with concurency?&lt;br /&gt;
&lt;br /&gt;
Never Depend on Untrusted Data&lt;br /&gt;
&lt;br /&gt;
Never trust user data for access control decisions&lt;br /&gt;
Never make access control decisions in JavaScript&lt;br /&gt;
Never depend on the order of values sent from the client&lt;br /&gt;
Never make authorization decisions based solely on&lt;br /&gt;
*hidden fields&lt;br /&gt;
*cookie values&lt;br /&gt;
*form parameters&lt;br /&gt;
*URL parameters&lt;br /&gt;
*anything else from the request&lt;br /&gt;
 &lt;br /&gt;
'''Access Control Issues'''&lt;br /&gt;
&lt;br /&gt;
Many administrative interfaces require only a password for authentication&lt;br /&gt;
Shared accounts combined with a lack of auditing and logging make it extremely difficult to differentiate between malicious and honest administrators&lt;br /&gt;
Administrative interfaces are often not designed as “secure” as user-level interfaces given the assumption that administrators are trusted users&lt;br /&gt;
Authorization/Access Control relies on client-side information (e.g., hidden fields)&lt;br /&gt;
	input type=&amp;quot;text&amp;quot; name=&amp;quot;fname&amp;quot; value=&amp;quot;Derek&amp;quot;&lt;br /&gt;
	input type=&amp;quot;text&amp;quot; name=&amp;quot;lname&amp;quot; value=&amp;quot;Jeter&amp;quot;&lt;br /&gt;
	input type=&amp;quot;hidden&amp;quot; name=&amp;quot;usertype&amp;quot; value=&amp;quot;admin&amp;quot;&lt;br /&gt;
&lt;br /&gt;
'''Attacking Access Controls'''&lt;br /&gt;
&lt;br /&gt;
*Elevation of privileges&lt;br /&gt;
*Disclosure of confidential data - Compromising admin-level accounts often result in access to a user's confidential data&lt;br /&gt;
*Data tampering - Privilege levels do not distinguish users who can only view data and users permitted to modify data&lt;br /&gt;
*Testing for Broken Access Control&lt;br /&gt;
&lt;br /&gt;
Attempt to access administrative components or functions as an anonymous or regular user&lt;br /&gt;
*Scour HTML source for “interesting” hidden form fields&lt;br /&gt;
*Test web accessible directory structure for names like admin, administrator, manager, etc (i.e. attempt to directly browse to “restricted” areas)&lt;br /&gt;
&lt;br /&gt;
Determine how administrators are authenticated. Ensure that adequate authentication is used and enforced&lt;br /&gt;
For each user role, ensure that only the appropriate pages or components are accessible for that role.&lt;br /&gt;
Login as a low-level user, browse history for a higher level user’s cache, load the page to see if the original authorization is passed to a previous session.&lt;br /&gt;
If able to compromise administrator-level account, test for all other common web application vulnerabilities (poor input validation, privileged database access, etc)&lt;br /&gt;
Defenses Against Access Control Attacks&lt;br /&gt;
&lt;br /&gt;
Implement role based access control to assign permissions to application users for vertical access control requirements&lt;br /&gt;
Implement data-contextual access control to assign permissions to application users in the context of specific data items for horizontal access control requirements&lt;br /&gt;
Avoid assigning permissions on a per-user basis&lt;br /&gt;
Perform consistent authorization checking routines on all application pages&lt;br /&gt;
Where applicable, apply DENY privileges last, issue ALLOW privileges on a case-by-case basis&lt;br /&gt;
Where possible restrict administrator access to machines located on the local area network (i.e. it’s best to avoid remote administrator access from public facing access points)&lt;br /&gt;
Log all failed access authorization requests to a secure location for review by administrators&lt;br /&gt;
Perform reviews of failed login attempts on a periodic basis&lt;br /&gt;
Utilize the strengths and functionality provided by the SSO solution you chose&lt;br /&gt;
Best Practice: Code to the Activity&lt;br /&gt;
&lt;br /&gt;
	if (AC.hasAccess(ARTICLE_EDIT)) {&lt;br /&gt;
		//execute activity&lt;br /&gt;
	}&lt;br /&gt;
Code it once, never needs to change again&lt;br /&gt;
Implies policy is persisted/centralized in some way&lt;br /&gt;
Avoid assigning permissions on a per-user basis&lt;br /&gt;
Requires more design/work up front to get right&lt;br /&gt;
Best Practice: Centralized ACL Controler&lt;br /&gt;
&lt;br /&gt;
Define a centralized access controller&lt;br /&gt;
	ACLService.isAuthorized(ACTION_CONSTANT)&lt;br /&gt;
	ACLService.assertAuthorized(ACTION_CONSTANT)&lt;br /&gt;
Access control decisions go through these simple API’s&lt;br /&gt;
Centralized logic to drive policy behavior and persistence&lt;br /&gt;
May contain data-driven access control policy information&lt;br /&gt;
Policy language needs to support ability to express both access rights and prohibitions&lt;br /&gt;
Best Practice: Using a Centralized Access Controller&lt;br /&gt;
&lt;br /&gt;
      In Presentation Layer&lt;br /&gt;
&lt;br /&gt;
	if (isAuthorized(VIEW_LOG_PANEL))&lt;br /&gt;
	{&lt;br /&gt;
		Here are the logs&lt;br /&gt;
		&amp;lt;%=getLogs();%/&amp;gt;&lt;br /&gt;
	}	&lt;br /&gt;
     In Controller&lt;br /&gt;
&lt;br /&gt;
	try (assertAuthorized(DELETE_USER))&lt;br /&gt;
	{&lt;br /&gt;
		deleteUser();&lt;br /&gt;
	}&lt;br /&gt;
Best Practice: Verifying policy server-side&lt;br /&gt;
&lt;br /&gt;
Keep user identity verification in session&lt;br /&gt;
Load entitlements server side from trusted sources&lt;br /&gt;
Force authorization checks on ALL requests&lt;br /&gt;
- JS file, image, AJAX and FLASH requests as well!&lt;br /&gt;
- Force this check using a filter if possible&lt;br /&gt;
SQL Integrated Access Control&lt;br /&gt;
&lt;br /&gt;
Example Feature&lt;br /&gt;
&lt;br /&gt;
	http://mail.example.com/viewMessage?msgid=2356342&lt;br /&gt;
This SQL would be vulnerable to tampering&lt;br /&gt;
&lt;br /&gt;
	select * from messages where messageid = 2356342&lt;br /&gt;
Ensure the owner is referenced in the query!&lt;br /&gt;
&lt;br /&gt;
	select * from messages where messageid = 2356342 AND messages.message_owner = &lt;br /&gt;
Access Control Positive Patterns&lt;br /&gt;
&lt;br /&gt;
Code to the activity, not the role&lt;br /&gt;
Centralize access control logic&lt;br /&gt;
Design access control as a filter&lt;br /&gt;
Deny by default, fail securely&lt;br /&gt;
Build centralized access control mechanism&lt;br /&gt;
Apply same core logic to presentation and server-side access control decisions&lt;br /&gt;
Determine access control through Server-side trusted data&lt;br /&gt;
Data Contextual Access Control&lt;br /&gt;
&lt;br /&gt;
Data Contextual / Horizontal Access Control API examples&lt;br /&gt;
&lt;br /&gt;
	ACLService.isAuthorized(EDIT_ORG, 142)&lt;br /&gt;
	ACLService.assertAuthorized(VIEW_ORG, 900)&lt;br /&gt;
Long Form&lt;br /&gt;
&lt;br /&gt;
	isAuthorized(user, EDIT_ORG, Organization.class, 14)&lt;br /&gt;
	&lt;br /&gt;
Essentially checking if the user has the right role in the context of a specific object&lt;br /&gt;
 Centralize access control logic&lt;br /&gt;
 Protecting data a the lowest level!&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=125910</id>
		<title>Access Control Cheat Sheet</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Access_Control_Cheat_Sheet&amp;diff=125910"/>
				<updated>2012-03-11T04:05:59Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: Created page with &amp;quot;=Introduction=  This article is focused on providing clear, simple, actionable guidance for providing Access Control security in your applications.  ==What is Access Control /...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;=Introduction=&lt;br /&gt;
&lt;br /&gt;
This article is focused on providing clear, simple, actionable guidance for providing Access Control security in your applications.&lt;br /&gt;
&lt;br /&gt;
==What is Access Control / Authorization?==&lt;br /&gt;
&lt;br /&gt;
Authorization is the process where requests to access a particular resource should be granted or denied. It should be noted that authorization is not equivalent to authentication - as these terms and their defininitions are frequently confused.&lt;br /&gt;
&lt;br /&gt;
Access Control is the method or mechanism of authorization to enfore that requests to a system resource or functionality should be granted.&lt;br /&gt;
&lt;br /&gt;
===Role Based Access Control (RBAC)=== is commonly used to manage permissions within an application. Permissions are assigned to users in a many to many relationship.&lt;br /&gt;
&lt;br /&gt;
===Discretioinary Access Control (DAC)=== is commonly used to manage permissions within an application.&lt;br /&gt;
&lt;br /&gt;
===Mandatory Access Control (MAC)=== is a classification based system of objects and subjects. To &amp;quot;write up&amp;quot;, a subject's clearance level must be&lt;br /&gt;
&lt;br /&gt;
==Attacks on Access Control==&lt;br /&gt;
&lt;br /&gt;
Vertical Access Control Attacks - A standard user accessing administration functionality&lt;br /&gt;
&lt;br /&gt;
Horizontal Access Control attacks - Same role, but accessing another user's private data&lt;br /&gt;
&lt;br /&gt;
Business Logic Access Control Attacks - Abuse of one or more linked activities that collectively realize a business objective&lt;br /&gt;
&lt;br /&gt;
==Access Control Issues==&lt;br /&gt;
&lt;br /&gt;
Many applications used the &amp;quot;All or Nothing&amp;quot; approach - Once authenticated, all users have equal privileges&lt;br /&gt;
&lt;br /&gt;
Authorization Logic often relies on Security by Obscurity (STO) by assuming:&lt;br /&gt;
&lt;br /&gt;
	- Users will not find unlinked or hidden paths or functionality&lt;br /&gt;
	- Users will not find and tamper with &amp;quot;obscured&amp;quot; client side parameters (i.e. &amp;quot;hidden&amp;quot; form fields, cookies, etc.)&lt;br /&gt;
	&lt;br /&gt;
     Applications with multiple permission levels/roles often increases the possibility of conflicting permission sets resulting in unanticipated privileges&lt;br /&gt;
&lt;br /&gt;
Access Control Anti-Patterns&lt;br /&gt;
&lt;br /&gt;
Hard-coded role checks in application code&lt;br /&gt;
Lack of centralized access control logic&lt;br /&gt;
Untrusted data driving access control decisions&lt;br /&gt;
Access control that is &amp;quot;open by default&amp;quot;&lt;br /&gt;
Lack of addressing horizontal access control in a standardized way (if at all)&lt;br /&gt;
Access control logic that needs to be manually added to every endpoint in code&lt;br /&gt;
Hard Coded Roles&lt;br /&gt;
&lt;br /&gt;
if (user.isManager() ||&lt;br /&gt;
		user.isAdministrator() ||&lt;br /&gt;
		user.isEditor() ||&lt;br /&gt;
		user.isUser()) {&lt;br /&gt;
&lt;br /&gt;
//  execute action&lt;br /&gt;
&lt;br /&gt;
}&lt;br /&gt;
Hard Codes Roles can create several issues including:&lt;br /&gt;
&lt;br /&gt;
Making the policy of an application difficult to &amp;quot;prove&amp;quot; for audit or Q/A purposes&lt;br /&gt;
Causing new code to be pushed each time an access control policy needs to be changed&lt;br /&gt;
They are fragile and easy to make mistakes&lt;br /&gt;
Order Specific Operations&lt;br /&gt;
&lt;br /&gt;
     Imagine the following parameters&lt;br /&gt;
&lt;br /&gt;
	http://example.com/buy?action=chooseDataPackage&lt;br /&gt;
	http://example.com/buy?action=customizePackage&lt;br /&gt;
	http://example.com/buy?action=makePayment&lt;br /&gt;
	http://example.com/buy?action=downloadData&lt;br /&gt;
     Can an attacker control the sequence?&lt;br /&gt;
&lt;br /&gt;
     Can an attacker abuse this with concurency?&lt;br /&gt;
&lt;br /&gt;
Never Depend on Untrusted Data&lt;br /&gt;
&lt;br /&gt;
Never trust user data for access control decisions&lt;br /&gt;
Never make access control decisions in JavaScript&lt;br /&gt;
Never depend on the order of values sent from the client&lt;br /&gt;
Never make authorization decisions based solely on&lt;br /&gt;
 - hidden fields&lt;br /&gt;
 - cookie values&lt;br /&gt;
 - form parameters&lt;br /&gt;
 - URL parameters&lt;br /&gt;
 - anything else from the request&lt;br /&gt;
 &lt;br /&gt;
Access Control Issues&lt;br /&gt;
&lt;br /&gt;
Many administrative interfaces require only a password for authentication&lt;br /&gt;
Shared accounts combined with a lack of auditing and logging make it extremely difficult to differentiate between malicious and honest administrators&lt;br /&gt;
Administrative interfaces are often not designed as “secure” as user-level interfaces given the assumption that administrators are trusted users&lt;br /&gt;
Authorization/Access Control relies on client-side information (e.g., hidden fields)&lt;br /&gt;
	input type=&amp;quot;text&amp;quot; name=&amp;quot;fname&amp;quot; value=&amp;quot;Derek&amp;quot;&lt;br /&gt;
	input type=&amp;quot;text&amp;quot; name=&amp;quot;lname&amp;quot; value=&amp;quot;Jeter&amp;quot;&lt;br /&gt;
	input type=&amp;quot;hidden&amp;quot; name=&amp;quot;usertype&amp;quot; value=&amp;quot;admin&amp;quot;&lt;br /&gt;
Attacking Access Controls&lt;br /&gt;
&lt;br /&gt;
Elevation of privileges&lt;br /&gt;
Disclosure of confidential data - Compromising admin-level accounts often result in access to a user's confidential data&lt;br /&gt;
Data tampering - Privilege levels do not distinguish users who can only view data and users permitted to modify data&lt;br /&gt;
Testing for Broken Access Control&lt;br /&gt;
&lt;br /&gt;
Attempt to access administrative components or functions as an anonymous or regular user&lt;br /&gt;
	 - Scour HTML source for “interesting” hidden form fields&lt;br /&gt;
	 - Test web accessible directory structure for names like admin, administrator, manager, etc (i.e. attempt to directly browse to “restricted” areas)&lt;br /&gt;
Determine how administrators are authenticated. Ensure that adequate authentication is used and enforced&lt;br /&gt;
For each user role, ensure that only the appropriate pages or components are accessible for that role.&lt;br /&gt;
Login as a low-level user, browse history for a higher level user’s cache, load the page to see if the original authorization is passed to a previous session.&lt;br /&gt;
If able to compromise administrator-level account, test for all other common web application vulnerabilities (poor input validation, privileged database access, etc)&lt;br /&gt;
Defenses Against Access Control Attacks&lt;br /&gt;
&lt;br /&gt;
Implement role based access control to assign permissions to application users for vertical access control requirements&lt;br /&gt;
Implement data-contextual access control to assign permissions to application users in the context of specific data items for horizontal access control requirements&lt;br /&gt;
Avoid assigning permissions on a per-user basis&lt;br /&gt;
Perform consistent authorization checking routines on all application pages&lt;br /&gt;
Where applicable, apply DENY privileges last, issue ALLOW privileges on a case-by-case basis&lt;br /&gt;
Where possible restrict administrator access to machines located on the local area network (i.e. it’s best to avoid remote administrator access from public facing access points)&lt;br /&gt;
Log all failed access authorization requests to a secure location for review by administrators&lt;br /&gt;
Perform reviews of failed login attempts on a periodic basis&lt;br /&gt;
Utilize the strengths and functionality provided by the SSO solution you chose&lt;br /&gt;
Best Practice: Code to the Activity&lt;br /&gt;
&lt;br /&gt;
	if (AC.hasAccess(ARTICLE_EDIT)) {&lt;br /&gt;
		//execute activity&lt;br /&gt;
	}&lt;br /&gt;
Code it once, never needs to change again&lt;br /&gt;
Implies policy is persisted/centralized in some way&lt;br /&gt;
Avoid assigning permissions on a per-user basis&lt;br /&gt;
Requires more design/work up front to get right&lt;br /&gt;
Best Practice: Centralized ACL Controler&lt;br /&gt;
&lt;br /&gt;
Define a centralized access controller&lt;br /&gt;
	ACLService.isAuthorized(ACTION_CONSTANT)&lt;br /&gt;
	ACLService.assertAuthorized(ACTION_CONSTANT)&lt;br /&gt;
Access control decisions go through these simple API’s&lt;br /&gt;
Centralized logic to drive policy behavior and persistence&lt;br /&gt;
May contain data-driven access control policy information&lt;br /&gt;
Policy language needs to support ability to express both access rights and prohibitions&lt;br /&gt;
Best Practice: Using a Centralized Access Controller&lt;br /&gt;
&lt;br /&gt;
      In Presentation Layer&lt;br /&gt;
&lt;br /&gt;
	if (isAuthorized(VIEW_LOG_PANEL))&lt;br /&gt;
	{&lt;br /&gt;
		Here are the logs&lt;br /&gt;
		&amp;lt;%=getLogs();%/&amp;gt;&lt;br /&gt;
	}	&lt;br /&gt;
     In Controller&lt;br /&gt;
&lt;br /&gt;
	try (assertAuthorized(DELETE_USER))&lt;br /&gt;
	{&lt;br /&gt;
		deleteUser();&lt;br /&gt;
	}&lt;br /&gt;
Best Practice: Verifying policy server-side&lt;br /&gt;
&lt;br /&gt;
Keep user identity verification in session&lt;br /&gt;
Load entitlements server side from trusted sources&lt;br /&gt;
Force authorization checks on ALL requests&lt;br /&gt;
- JS file, image, AJAX and FLASH requests as well!&lt;br /&gt;
- Force this check using a filter if possible&lt;br /&gt;
SQL Integrated Access Control&lt;br /&gt;
&lt;br /&gt;
Example Feature&lt;br /&gt;
&lt;br /&gt;
	http://mail.example.com/viewMessage?msgid=2356342&lt;br /&gt;
This SQL would be vulnerable to tampering&lt;br /&gt;
&lt;br /&gt;
	select * from messages where messageid = 2356342&lt;br /&gt;
Ensure the owner is referenced in the query!&lt;br /&gt;
&lt;br /&gt;
	select * from messages where messageid = 2356342 AND messages.message_owner = &lt;br /&gt;
Access Control Positive Patterns&lt;br /&gt;
&lt;br /&gt;
Code to the activity, not the role&lt;br /&gt;
Centralize access control logic&lt;br /&gt;
Design access control as a filter&lt;br /&gt;
Deny by default, fail securely&lt;br /&gt;
Build centralized access control mechanism&lt;br /&gt;
Apply same core logic to presentation and server-side access control decisions&lt;br /&gt;
Determine access control through Server-side trusted data&lt;br /&gt;
Data Contextual Access Control&lt;br /&gt;
&lt;br /&gt;
Data Contextual / Horizontal Access Control API examples&lt;br /&gt;
&lt;br /&gt;
	ACLService.isAuthorized(EDIT_ORG, 142)&lt;br /&gt;
	ACLService.assertAuthorized(VIEW_ORG, 900)&lt;br /&gt;
Long Form&lt;br /&gt;
&lt;br /&gt;
	isAuthorized(user, EDIT_ORG, Organization.class, 14)&lt;br /&gt;
	&lt;br /&gt;
Essentially checking if the user has the right role in the context of a specific object&lt;br /&gt;
 Centralize access control logic&lt;br /&gt;
 Protecting data a the lowest level!&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Template:Cheatsheet_Navigation&amp;diff=125909</id>
		<title>Template:Cheatsheet Navigation</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Template:Cheatsheet_Navigation&amp;diff=125909"/>
				<updated>2012-03-11T04:00:35Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''OWASP Cheat Sheets Project Homepage'''&lt;br /&gt;
* [[Cheat Sheets]]&lt;br /&gt;
&lt;br /&gt;
'''OWASP Cheat Sheet Series'''&lt;br /&gt;
* [[Access Control Cheat Sheet]]&lt;br /&gt;
* [[Authentication Cheat Sheet]]&lt;br /&gt;
* [[Cross-Site Request Forgery (CSRF) Prevention Cheat Sheet]]&lt;br /&gt;
* [[Transport Layer Protection Cheat Sheet]]&lt;br /&gt;
* [[Cryptographic Storage Cheat Sheet]]&lt;br /&gt;
* [[Input Validation Cheat Sheet]]&lt;br /&gt;
* [[XSS Prevention Cheat Sheet]]&lt;br /&gt;
* [[DOM based XSS Prevention Cheat Sheet]]&lt;br /&gt;
* [[Forgot Password Cheat Sheet]]&lt;br /&gt;
* [[Query Parameterization Cheat Sheet]]&lt;br /&gt;
* [[SQL Injection Prevention Cheat Sheet]]&lt;br /&gt;
* [[Session Management Cheat Sheet]]&lt;br /&gt;
* [[HTML5 Security Cheat Sheet]]&lt;br /&gt;
* [[Web Service Security Cheat Sheet]]&lt;br /&gt;
* [[Application Security Architecture Cheat Sheet]]&lt;br /&gt;
&lt;br /&gt;
'''Draft OWASP Cheat Sheets'''&lt;br /&gt;
* [[REST Security Cheat Sheet]]&lt;br /&gt;
* [[Abridged XSS Prevention Cheat Sheet]]&lt;br /&gt;
* [[PHP Security Cheat Sheet]]&lt;br /&gt;
* [[Password Storage Cheat Sheet]]&lt;br /&gt;
* [[Secure Coding Cheat Sheet]]&lt;br /&gt;
* [[Threat Modeling Cheat Sheet]]&lt;br /&gt;
* [[Clickjacking Cheat Sheet]]&lt;br /&gt;
* [[Virtual Patching Cheat Sheet]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Projects/OWASP_Cheat_Sheets_Project&amp;diff=125908</id>
		<title>Projects/OWASP Cheat Sheets Project</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Projects/OWASP_Cheat_Sheets_Project&amp;diff=125908"/>
				<updated>2012-03-11T03:59:49Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Template:&amp;lt;includeonly&amp;gt;{{{1}}}&amp;lt;/includeonly&amp;gt;&amp;lt;noinclude&amp;gt;Project About&amp;lt;/noinclude&amp;gt;&lt;br /&gt;
| project_name = OWASP Cheat Sheets Project&lt;br /&gt;
| project_home_page = Cheat Sheets&lt;br /&gt;
| project_description = This project was created to provide a concise collection of high value information on specific security topics. These cheat sheets were created by multiple application security experts and provide excellent security guidance in an easy to read format.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
| project_license = [http://creativecommons.org/licenses/by-sa/3.0/ Creative Commons Attribution ShareAlike 3.0 license] &lt;br /&gt;
&lt;br /&gt;
| leader_name2 = Jim Manico&lt;br /&gt;
| leader_email2 = jim.manico@owasp.org&lt;br /&gt;
| leader_username2 = Jmanico&lt;br /&gt;
&lt;br /&gt;
| leader_name[3-10] =&lt;br /&gt;
| leader_email[3-10] =&lt;br /&gt;
| leader_username[3-10] = &lt;br /&gt;
&lt;br /&gt;
| contributor_name1 = Michael Coates&lt;br /&gt;
| contributor_email1 = Michael.Coates@owasp.org&lt;br /&gt;
| contributor_username1 = MichaelCoates&lt;br /&gt;
&lt;br /&gt;
| contributor_name[2-10] = &lt;br /&gt;
| contributor_email[2-10] = &lt;br /&gt;
| contributor_username[2-10] = &lt;br /&gt;
&lt;br /&gt;
| pamphlet_link = &lt;br /&gt;
&lt;br /&gt;
| presentation_link =&lt;br /&gt;
&lt;br /&gt;
| mailing_list_name = https://lists.owasp.org/mailman/listinfo/owasp-cheat-sheets&lt;br /&gt;
&lt;br /&gt;
| project_road_map = https://www.owasp.org/index.php/Cheat_Sheets/Roadmap&lt;br /&gt;
&lt;br /&gt;
| links_url1 = &lt;br /&gt;
| links_name1 = &lt;br /&gt;
&lt;br /&gt;
| links_url2 = &lt;br /&gt;
| links_name2 = &lt;br /&gt;
&lt;br /&gt;
| links_url3 = &lt;br /&gt;
| links_name3 = &lt;br /&gt;
&lt;br /&gt;
| links_url4 = &lt;br /&gt;
| links_name4 = &lt;br /&gt;
&lt;br /&gt;
| links_url5 = &lt;br /&gt;
| links_name5 = &lt;br /&gt;
&lt;br /&gt;
| links_url6 = &lt;br /&gt;
| links_name6 = &lt;br /&gt;
&lt;br /&gt;
| links_url7 = &lt;br /&gt;
| links_name7 = &lt;br /&gt;
&lt;br /&gt;
| links_url8 = &lt;br /&gt;
| links_name8 = &lt;br /&gt;
&lt;br /&gt;
| links_url9 = &lt;br /&gt;
| links_name9 = &lt;br /&gt;
&lt;br /&gt;
| links_url10 = &lt;br /&gt;
| links_name10 = &lt;br /&gt;
&lt;br /&gt;
| release_1 = &lt;br /&gt;
| release_2 = &lt;br /&gt;
| release_3 =&lt;br /&gt;
| release_4 =&lt;br /&gt;
&amp;lt;!--- The line below is for GPC usage only. Please do not edit it ---&amp;gt;&lt;br /&gt;
| project_about_page = Projects/OWASP Cheat Sheets Project&lt;br /&gt;
}}&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123762</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123762"/>
				<updated>2012-02-05T01:26:15Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== OWASP Ottawa Training Day ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Event Sponsors: ''' &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
| [[Image:SS_logo.png|300x150px|SS_logo.png|link=http://softwaresecured.com]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====Integrating security in a webapp project: from the idea to going live====&lt;br /&gt;
===Concept:===&lt;br /&gt;
A 1-day training covering 3 major topics related to integrating security&lt;br /&gt;
in a software development project:&lt;br /&gt;
* Good practices and tools at design stage (security requirements,secure design, threat modeling)&lt;br /&gt;
* Good practices and tools at implementation stage (secure coding practices and code review)&lt;br /&gt;
* Good practices and tools at verification stage (security validation)&lt;br /&gt;
&lt;br /&gt;
The entire training will follow a red-line based on a real-life HR web&lt;br /&gt;
application project in which we will manage security and privacy&lt;br /&gt;
aspects. Students will cover the entire lifecycle of the application,&lt;br /&gt;
from analysis to deployment, and integrate good practices and tools&lt;br /&gt;
based on OWASP material.&lt;br /&gt;
&lt;br /&gt;
===Trainers:===&lt;br /&gt;
* Antonio Fontes, Switzerland&lt;br /&gt;
* Philippe Gamache, Canada&lt;br /&gt;
* Sébastien Gioria, France&lt;br /&gt;
&lt;br /&gt;
===Course format:===&lt;br /&gt;
* The training is composed of three modules, each consisting of three 45-minutes blocks (total: 9 blocks)&lt;br /&gt;
* Each module includes three blocks: theory, hands-on, validation/debriefing.&lt;br /&gt;
&lt;br /&gt;
===Schedule:===&lt;br /&gt;
* 8:45-9:30, 9:40-10:25, 10:30-11:15 -&amp;gt; &amp;quot;design&amp;quot; module&lt;br /&gt;
* 11:30-12:30 -&amp;gt; lunch&lt;br /&gt;
* 12:45-13:30, 13:35-14:20, 14:25-15:10 -&amp;gt; &amp;quot;implementation&amp;quot; module&lt;br /&gt;
* 15:10-15:40 -&amp;gt; cookie break&lt;br /&gt;
* 15:40-16:25, 16:30-17:15, 17:20-18:05 -&amp;gt; &amp;quot;verification&amp;quot; module&lt;br /&gt;
* 18:10 -&amp;gt; closing session (debriefing/conclusions)&lt;br /&gt;
&lt;br /&gt;
We expect students to arrive around 8am and be able to leave around 6:30/7pm&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
===Pre-requisites (required skills and material):===&lt;br /&gt;
* Bring your own laptop (recommended: dual-core system running VMWare/Virtualbox)&lt;br /&gt;
* Experience in web application development (hands-on will be in JAVA but do not require in-depth knowledge of the language)&lt;br /&gt;
* Understanding of a web application project lifecycle&lt;br /&gt;
* Understanding of well-known web application attacks (Top 10 attacks)&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills) &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123761</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123761"/>
				<updated>2012-02-05T01:25:56Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== OWASP Ottawa Training Day ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Event Sponsors: ''' &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
| [[Image:SS_logo.png|300x150px|SS_logo.png|link=http://softwaresecured.com]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====Integrating security in a webapp project: from the idea to going live====&lt;br /&gt;
===Concept:===&lt;br /&gt;
A 1-day training covering 3 major topics related to integrating security&lt;br /&gt;
in a software development project:&lt;br /&gt;
* Good practices and tools at design stage (security requirements,secure design, threat modeling)&lt;br /&gt;
* Good practices and tools at implementation stage (secure coding practices and code review)&lt;br /&gt;
* Good practices and tools at verification stage (security validation)&lt;br /&gt;
&lt;br /&gt;
The entire training will follow a red-line based on a real-life HR web&lt;br /&gt;
application project in which we will manage security and privacy&lt;br /&gt;
aspects. Students will cover the entire lifecycle of the application,&lt;br /&gt;
from analysis to deployment, and integrate good practices and tools&lt;br /&gt;
based on OWASP material.&lt;br /&gt;
&lt;br /&gt;
===Trainers:===&lt;br /&gt;
* Antonio Fontes, Switzerland&lt;br /&gt;
* Philippe Gamache, Canada&lt;br /&gt;
* Sébastien Gioria, France&lt;br /&gt;
&lt;br /&gt;
===Course format:===&lt;br /&gt;
* The training is composed of three modules, each consisting of three 45-minutes blocks (total: 9 blocks)&lt;br /&gt;
* Each module includes three blocks: theory, hands-on, validation/debriefing.&lt;br /&gt;
&lt;br /&gt;
===Schedule:===&lt;br /&gt;
* 8:45-9:30, 9:40-10:25, 10:30-11:15 -&amp;gt; &amp;quot;design&amp;quot; module&lt;br /&gt;
* 11:30-12:30 -&amp;gt; lunch&lt;br /&gt;
* 12:45-13:30, 13:35-14:20, 14:25-15:10 -&amp;gt; &amp;quot;implementation&amp;quot; module&lt;br /&gt;
* 15:10-15:40 -&amp;gt; cookie break&lt;br /&gt;
* 15:40-16:25, 16:30-17:15, 17:20-18:05 -&amp;gt; &amp;quot;verification&amp;quot; module&lt;br /&gt;
* 18:10 -&amp;gt; closing session (debriefing/conclusions)&lt;br /&gt;
&lt;br /&gt;
We expect students to arrive around 8am and be able to leave around 6:30/7pm&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
===Pre-requisites (required skills and material):===&lt;br /&gt;
* Bring your own laptop (recommended: dual-core system running VMWare/Virtualbox)&lt;br /&gt;
* Experience in web application development (hands-on will be in JAVA but do not require in-depth knowledge of the language)&lt;br /&gt;
* Understanding of a web application project lifecycle&lt;br /&gt;
* Understanding of well-known web application attacks (Top 10 attacks)&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills) &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123760</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123760"/>
				<updated>2012-02-05T01:25:35Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== OWASP Ottawa Training Day ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Event Sponsors: ''' &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
| [[Image:SS_logo.png|300x150px|SS_logo.png|link=http://softwaresecured.com]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====Integrating security in a webapp project: from the idea to going live====&lt;br /&gt;
===Concept:===&lt;br /&gt;
A 1-day training covering 3 major topics related to integrating security&lt;br /&gt;
in a software development project:&lt;br /&gt;
* Good practices and tools at design stage (security requirements,secure design, threat modeling)&lt;br /&gt;
* Good practices and tools at implementation stage (secure coding practices and code review)&lt;br /&gt;
* Good practices and tools at verification stage (security validation)&lt;br /&gt;
&lt;br /&gt;
The entire training will follow a red-line based on a real-life HR web&lt;br /&gt;
application project in which we will manage security and privacy&lt;br /&gt;
aspects. Students will cover the entire lifecycle of the application,&lt;br /&gt;
from analysis to deployment, and integrate good practices and tools&lt;br /&gt;
based on OWASP material.&lt;br /&gt;
&lt;br /&gt;
===Trainers:===&lt;br /&gt;
* Antonio Fontes, Switzerland&lt;br /&gt;
* Philippe Gamache, Canada&lt;br /&gt;
* Sébastien Gioria, France&lt;br /&gt;
&lt;br /&gt;
===Course format:===&lt;br /&gt;
* The training is composed of three modules, each consisting of three 45-minutes blocks (total: 9 blocks)&lt;br /&gt;
* Each module includes three blocks: theory, hands-on, validation/debriefing.&lt;br /&gt;
&lt;br /&gt;
===Schedule:===&lt;br /&gt;
* 8:45-9:30, 9:40-10:25, 10:30-11:15 -&amp;gt; &amp;quot;design&amp;quot; module&lt;br /&gt;
* 11:30-12:30 -&amp;gt; lunch&lt;br /&gt;
* 12:45-13:30, 13:35-14:20, 14:25-15:10 -&amp;gt; &amp;quot;implementation&amp;quot; module&lt;br /&gt;
* 15:10-15:40 -&amp;gt; cookie break&lt;br /&gt;
* 15:40-16:25, 16:30-17:15, 17:20-18:05 -&amp;gt; &amp;quot;verification&amp;quot; module&lt;br /&gt;
* 18:10 -&amp;gt; closing session (debriefing/conclusions)&lt;br /&gt;
&lt;br /&gt;
We expect students to arrive around 8am and be able to leave around 6:30/7pm&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
===Pre-requisites (required skills and material):===&lt;br /&gt;
* Bring your own laptop (recommended: dual-core system running VMWare/Virtualbox)&lt;br /&gt;
* Experience in web application development (hands-on will be in JAVA but do not require in-depth knowledge of the language)&lt;br /&gt;
* Understanding of a web application project lifecycle&lt;br /&gt;
* Understanding of well-known web application attacks (Top 10 attacks)&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills) &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123759</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123759"/>
				<updated>2012-02-05T01:22:41Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== OWASP Ottawa Training Day ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Event Sponsors: ''' &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
| [[Image:SS_logo.png|300x150px|SS_logo.png|link=http://softwaresecured.com]]&lt;br /&gt;
|&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
====Integrating security in a webapp project: from the idea to going live====&lt;br /&gt;
===Concept:===&lt;br /&gt;
A 1-day training covering 3 major topics related to integrating security&lt;br /&gt;
in a software development project:&lt;br /&gt;
* Good practices and tools at design stage (security requirements,secure design, threat modeling)&lt;br /&gt;
* Good practices and tools at implementation stage (secure coding practices and code review)&lt;br /&gt;
* Good practices and tools at verification stage (security validation)&lt;br /&gt;
&lt;br /&gt;
The entire training will follow a red-line based on a real-life HR web&lt;br /&gt;
application project in which we will manage security and privacy&lt;br /&gt;
aspects. Students will cover the entire lifecycle of the application,&lt;br /&gt;
from analysis to deployment, and integrate good practices and tools&lt;br /&gt;
based on OWASP material.&lt;br /&gt;
&lt;br /&gt;
===Trainers:===&lt;br /&gt;
* Antonio Fontes, Switzerland&lt;br /&gt;
* Philippe Gamache, Canada&lt;br /&gt;
* Sébastien Gioria, France&lt;br /&gt;
&lt;br /&gt;
===Course format:===&lt;br /&gt;
* The training is composed of three modules, each consisting of three 45-minutes blocks (total: 9 blocks)&lt;br /&gt;
* Each module includes three blocks: theory, hands-on, validation/debriefing.&lt;br /&gt;
&lt;br /&gt;
===Schedule:===&lt;br /&gt;
* 8:45-9:30, 9:40-10:25, 10:30-11:15 -&amp;gt; &amp;quot;design&amp;quot; module&lt;br /&gt;
* 11:30-12:30 -&amp;gt; lunch&lt;br /&gt;
* 12:45-13:30, 13:35-14:20, 14:25-15:10 -&amp;gt; &amp;quot;implementation&amp;quot; module&lt;br /&gt;
* 15:10-15:40 -&amp;gt; cookie break&lt;br /&gt;
* 15:40-16:25, 16:30-17:15, 17:20-18:05 -&amp;gt; &amp;quot;verification&amp;quot; module&lt;br /&gt;
* 18:10 -&amp;gt; closing session (debriefing/conclusions)&lt;br /&gt;
&lt;br /&gt;
We expect students to arrive around 8am and be able to leave around 6:30/7pm&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
===Pre-requisites (required skills and material):===&lt;br /&gt;
* Bring your own laptop (recommended: dual-core system running VMWare/Virtualbox)&lt;br /&gt;
* Experience in web application development (hands-on will be in JAVA but do not require in-depth knowledge of the language)&lt;br /&gt;
* Understanding of a web application project lifecycle&lt;br /&gt;
* Understanding of well-known web application attacks (Top 10 attacks)&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills) &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123729</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123729"/>
				<updated>2012-02-03T22:04:11Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
=== OWASP Ottawa Training Day ===&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Event Sponsor: ''' &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|200x100px|2keys%20(big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|  [[Image:SS_logo.png|300x150px|SS_logo.png|link=http://softwaresecured.com]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
====Integrating security in a webapp project: from the idea to going live====&lt;br /&gt;
===Concept:===&lt;br /&gt;
A 1-day training covering 3 major topics related to integrating security&lt;br /&gt;
in a software development project:&lt;br /&gt;
* Good practices and tools at design stage (security requirements,secure design, threat modeling)&lt;br /&gt;
* Good practices and tools at implementation stage (secure coding practices and code review)&lt;br /&gt;
* Good practices and tools at verification stage (security validation)&lt;br /&gt;
&lt;br /&gt;
The entire training will follow a red-line based on a real-life HR web&lt;br /&gt;
application project in which we will manage security and privacy&lt;br /&gt;
aspects. Students will cover the entire lifecycle of the application,&lt;br /&gt;
from analysis to deployment, and integrate good practices and tools&lt;br /&gt;
based on OWASP material.&lt;br /&gt;
&lt;br /&gt;
===Trainers:===&lt;br /&gt;
* Antonio Fontes, Switzerland&lt;br /&gt;
* Philippe Gamache, Canada&lt;br /&gt;
* Sébastien Gioria, France&lt;br /&gt;
&lt;br /&gt;
===Course format:===&lt;br /&gt;
* The training is composed of three modules, each consisting of three 45-minutes blocks (total: 9 blocks)&lt;br /&gt;
* Each module includes three blocks: theory, hands-on, validation/debriefing.&lt;br /&gt;
&lt;br /&gt;
===Schedule:===&lt;br /&gt;
* 8:45-9:30, 9:40-10:25, 10:30-11:15 -&amp;gt; &amp;quot;design&amp;quot; module&lt;br /&gt;
* 11:30-12:30 -&amp;gt; lunch&lt;br /&gt;
* 12:45-13:30, 13:35-14:20, 14:25-15:10 -&amp;gt; &amp;quot;implementation&amp;quot; module&lt;br /&gt;
* 15:10-15:40 -&amp;gt; cookie break&lt;br /&gt;
* 15:40-16:25, 16:30-17:15, 17:20-18:05 -&amp;gt; &amp;quot;verification&amp;quot; module&lt;br /&gt;
* 18:10 -&amp;gt; closing session (debriefing/conclusions)&lt;br /&gt;
&lt;br /&gt;
We expect students to arrive around 8am and be able to leave around 6:30/7pm&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
===Pre-requisites (required skills and material):===&lt;br /&gt;
* Bring your own laptop (recommended: dual-core system running VMWare/Virtualbox)&lt;br /&gt;
* Experience in web application development (hands-on will be in JAVA but do not require in-depth knowledge of the language)&lt;br /&gt;
* Understanding of a web application project lifecycle&lt;br /&gt;
* Understanding of well-known web application attacks (Top 10 attacks)&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills) &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123724</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123724"/>
				<updated>2012-02-03T16:46:52Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Meeting Sponsor: ''' &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|  [[Image:SS_logo.png|400x200px|SS_logo.png|link=http://softwaresecured.com]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OWASP Ottawa Training Day ====&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
====Integrating security in a webapp project: from the idea to going live====&lt;br /&gt;
===Concept:===&lt;br /&gt;
A 1-day training covering 3 major topics related to integrating security&lt;br /&gt;
in a software development project:&lt;br /&gt;
* Good practices and tools at design stage (security requirements,secure design, threat modeling)&lt;br /&gt;
* Good practices and tools at implementation stage (secure coding practices and code review)&lt;br /&gt;
* Good practices and tools at verification stage (security validation)&lt;br /&gt;
&lt;br /&gt;
The entire training will follow a red-line based on a real-life HR web&lt;br /&gt;
application project in which we will manage security and privacy&lt;br /&gt;
aspects. Students will cover the entire lifecycle of the application,&lt;br /&gt;
from analysis to deployment, and integrate good practices and tools&lt;br /&gt;
based on OWASP material.&lt;br /&gt;
&lt;br /&gt;
===Trainers:===&lt;br /&gt;
* Antonio Fontes, Switzerland&lt;br /&gt;
* Philippe Gamache, Canada&lt;br /&gt;
* Sébastien Gioria, France&lt;br /&gt;
&lt;br /&gt;
===Course format:===&lt;br /&gt;
* The training is composed of three modules, each consisting of three 45-minutes blocks (total: 9 blocks)&lt;br /&gt;
* Each module includes three blocks: theory, hands-on, validation/debriefing.&lt;br /&gt;
&lt;br /&gt;
===Schedule:===&lt;br /&gt;
* 8:45-9:30, 9:40-10:25, 10:30-11:15 -&amp;gt; &amp;quot;design&amp;quot; module&lt;br /&gt;
* 11:30-12:30 -&amp;gt; lunch&lt;br /&gt;
* 12:45-13:30, 13:35-14:20, 14:25-15:10 -&amp;gt; &amp;quot;implementation&amp;quot; module&lt;br /&gt;
* 15:10-15:40 -&amp;gt; cookie break&lt;br /&gt;
* 15:40-16:25, 16:30-17:15, 17:20-18:05 -&amp;gt; &amp;quot;verification&amp;quot; module&lt;br /&gt;
* 18:10 -&amp;gt; closing session (debriefing/conclusions)&lt;br /&gt;
&lt;br /&gt;
We expect students to arrive around 8am and be able to leave around 6:30/7pm&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
===Pre-requisites (required skills and material):===&lt;br /&gt;
* Bring your own laptop (recommended: dual-core system running VMWare/Virtualbox)&lt;br /&gt;
* Experience in web application development (hands-on will be in JAVA but do not require in-depth knowledge of the language)&lt;br /&gt;
* Understanding of a web application project lifecycle&lt;br /&gt;
* Understanding of well-known web application attacks (Top 10 attacks)&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills) &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123723</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123723"/>
				<updated>2012-02-03T16:46:35Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Meeting Sponsor: ''' &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
|  [[Image:SS_logo.png|200x100px|SS_logo.png|link=http://softwaresecured.com]]&lt;br /&gt;
|}&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OWASP Ottawa Training Day ====&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
====Integrating security in a webapp project: from the idea to going live====&lt;br /&gt;
===Concept:===&lt;br /&gt;
A 1-day training covering 3 major topics related to integrating security&lt;br /&gt;
in a software development project:&lt;br /&gt;
* Good practices and tools at design stage (security requirements,secure design, threat modeling)&lt;br /&gt;
* Good practices and tools at implementation stage (secure coding practices and code review)&lt;br /&gt;
* Good practices and tools at verification stage (security validation)&lt;br /&gt;
&lt;br /&gt;
The entire training will follow a red-line based on a real-life HR web&lt;br /&gt;
application project in which we will manage security and privacy&lt;br /&gt;
aspects. Students will cover the entire lifecycle of the application,&lt;br /&gt;
from analysis to deployment, and integrate good practices and tools&lt;br /&gt;
based on OWASP material.&lt;br /&gt;
&lt;br /&gt;
===Trainers:===&lt;br /&gt;
* Antonio Fontes, Switzerland&lt;br /&gt;
* Philippe Gamache, Canada&lt;br /&gt;
* Sébastien Gioria, France&lt;br /&gt;
&lt;br /&gt;
===Course format:===&lt;br /&gt;
* The training is composed of three modules, each consisting of three 45-minutes blocks (total: 9 blocks)&lt;br /&gt;
* Each module includes three blocks: theory, hands-on, validation/debriefing.&lt;br /&gt;
&lt;br /&gt;
===Schedule:===&lt;br /&gt;
* 8:45-9:30, 9:40-10:25, 10:30-11:15 -&amp;gt; &amp;quot;design&amp;quot; module&lt;br /&gt;
* 11:30-12:30 -&amp;gt; lunch&lt;br /&gt;
* 12:45-13:30, 13:35-14:20, 14:25-15:10 -&amp;gt; &amp;quot;implementation&amp;quot; module&lt;br /&gt;
* 15:10-15:40 -&amp;gt; cookie break&lt;br /&gt;
* 15:40-16:25, 16:30-17:15, 17:20-18:05 -&amp;gt; &amp;quot;verification&amp;quot; module&lt;br /&gt;
* 18:10 -&amp;gt; closing session (debriefing/conclusions)&lt;br /&gt;
&lt;br /&gt;
We expect students to arrive around 8am and be able to leave around 6:30/7pm&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
===Pre-requisites (required skills and material):===&lt;br /&gt;
* Bring your own laptop (recommended: dual-core system running VMWare/Virtualbox)&lt;br /&gt;
* Experience in web application development (hands-on will be in JAVA but do not require in-depth knowledge of the language)&lt;br /&gt;
* Understanding of a web application project lifecycle&lt;br /&gt;
* Understanding of well-known web application attacks (Top 10 attacks)&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills) &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123722</id>
		<title>Ottawa</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=Ottawa&amp;diff=123722"/>
				<updated>2012-02-03T16:44:06Z</updated>
		
		<summary type="html">&lt;p&gt;Koussa: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;{{Chapter Template|chaptername=Ottawa|extra=The chapter's president is [mailto:sherif.koussa@gmail.com Sherif Koussa] &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
&amp;lt;b&amp;gt;Follow us on  [http://twitter.com/#!/owasp_ottawa Twitter]&amp;lt;/b&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;paypal&amp;gt;Ottawa&amp;lt;/paypal&amp;gt; &lt;br /&gt;
&lt;br /&gt;
|mailinglistsite=http://lists.owasp.org/mailman/listinfo/owasp-ottawa|emailarchives=http://lists.owasp.org/mailman/listinfo/owasp-ottawa}} &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''Meeting Sponsor: ''' &lt;br /&gt;
&lt;br /&gt;
{| width=&amp;quot;900&amp;quot; border=&amp;quot;0&amp;quot; align=&amp;quot;left&amp;quot; cellpadding=&amp;quot;1&amp;quot; cellspacing=&amp;quot;1&amp;quot;&lt;br /&gt;
|-&lt;br /&gt;
| [[Image:2keys (big).jpg|link=http://www.2keys.ca]] &lt;br /&gt;
| [[Image:SS_logo.png|link=http://www.softwaresecured.com]] |}&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==== OWASP Ottawa Training Day ====&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
====Integrating security in a webapp project: from the idea to going live====&lt;br /&gt;
===Concept:===&lt;br /&gt;
A 1-day training covering 3 major topics related to integrating security&lt;br /&gt;
in a software development project:&lt;br /&gt;
* Good practices and tools at design stage (security requirements,secure design, threat modeling)&lt;br /&gt;
* Good practices and tools at implementation stage (secure coding practices and code review)&lt;br /&gt;
* Good practices and tools at verification stage (security validation)&lt;br /&gt;
&lt;br /&gt;
The entire training will follow a red-line based on a real-life HR web&lt;br /&gt;
application project in which we will manage security and privacy&lt;br /&gt;
aspects. Students will cover the entire lifecycle of the application,&lt;br /&gt;
from analysis to deployment, and integrate good practices and tools&lt;br /&gt;
based on OWASP material.&lt;br /&gt;
&lt;br /&gt;
===Trainers:===&lt;br /&gt;
* Antonio Fontes, Switzerland&lt;br /&gt;
* Philippe Gamache, Canada&lt;br /&gt;
* Sébastien Gioria, France&lt;br /&gt;
&lt;br /&gt;
===Course format:===&lt;br /&gt;
* The training is composed of three modules, each consisting of three 45-minutes blocks (total: 9 blocks)&lt;br /&gt;
* Each module includes three blocks: theory, hands-on, validation/debriefing.&lt;br /&gt;
&lt;br /&gt;
===Schedule:===&lt;br /&gt;
* 8:45-9:30, 9:40-10:25, 10:30-11:15 -&amp;gt; &amp;quot;design&amp;quot; module&lt;br /&gt;
* 11:30-12:30 -&amp;gt; lunch&lt;br /&gt;
* 12:45-13:30, 13:35-14:20, 14:25-15:10 -&amp;gt; &amp;quot;implementation&amp;quot; module&lt;br /&gt;
* 15:10-15:40 -&amp;gt; cookie break&lt;br /&gt;
* 15:40-16:25, 16:30-17:15, 17:20-18:05 -&amp;gt; &amp;quot;verification&amp;quot; module&lt;br /&gt;
* 18:10 -&amp;gt; closing session (debriefing/conclusions)&lt;br /&gt;
&lt;br /&gt;
We expect students to arrive around 8am and be able to leave around 6:30/7pm&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
===Pre-requisites (required skills and material):===&lt;br /&gt;
* Bring your own laptop (recommended: dual-core system running VMWare/Virtualbox)&lt;br /&gt;
* Experience in web application development (hands-on will be in JAVA but do not require in-depth knowledge of the language)&lt;br /&gt;
* Understanding of a web application project lifecycle&lt;br /&gt;
* Understanding of well-known web application attacks (Top 10 attacks)&lt;br /&gt;
&lt;br /&gt;
'''[https://www.regonline.com/integratingsecurityottawa REGISTER NOW!]'''&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
= Upcoming  Event Ideas =&lt;br /&gt;
We are always looking for ideas for upcoming meetings. If you have a speaker you would like to see, a tutorial you would like to participate in, or just some ideas for discussion topics let us know. We maintain a list of your ideas here. To add to the list you can edit it directly, send one of us an e-mail ([mailto:sherif.koussa@owasp.org Sherif], [mailto:sergei.frankoff@owasp.org Sergei]), or tweet it at our [http://twitter.com/#!/owasp_ottawa Twitter account].&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
*N00bs Night: Understanding and Exploiting the OWASP Top 10 (Top 10 discussion, live exploit demos, test lab to practice your skills) &lt;br /&gt;
*Web Application Forensics&lt;br /&gt;
*xPath Injection (SQL/CSS etc get lots of press but I’d like to hear more about this)&lt;br /&gt;
*HTML5 - What's new for security specially for Offline Applications&lt;br /&gt;
*Web 2.0 Security Evolution - How security challenges are changing with technology evolultion&lt;br /&gt;
*ASP.NET MVC Security for WebForms Developers&lt;br /&gt;
*Hack proofing your web application by using reverse engineering&lt;br /&gt;
*Using Windows Communication Foundation (WCF) Securely in your applications&lt;br /&gt;
&lt;br /&gt;
= Past Meetings =&lt;br /&gt;
==== December 12, 2011  ====&lt;br /&gt;
'''Location:''' Bell Canada - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
'''Title:''' n00bs night out...exploiting the owasp top 10&lt;br /&gt;
&lt;br /&gt;
Hey Ottawa, come join us for a FREE night of web application hacking. We have tutorials explaining how to exploit the OWASP Top 10 web application vulnerabilities and hands on labs to practice your skills. Bring your laptop and a copy of the Backtrack 5 LiveCD (or VM) http://www.backtrack-linux.org/downloads/&lt;br /&gt;
&lt;br /&gt;
'''Who:''' all skill levels are welcome (especially n00bs)&lt;br /&gt;
&lt;br /&gt;
'''When:''' December 12 from 6:00pm - 9:00pm (open at 5:30)&lt;br /&gt;
&lt;br /&gt;
'''RSVP:''' http://n00bs-night.eventbrite.com/&lt;br /&gt;
&lt;br /&gt;
==== September 27th, 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location''': Shopify - 61a York St (Above Tucker's Marketplace) &lt;br /&gt;
&lt;br /&gt;
'''Speaker Notes:''' [https://www.owasp.org/images/a/a2/OWASP_Sep_2011_Hacking_Silverlight.ppt Download Here] &lt;br /&gt;
&lt;br /&gt;
'''Microsoft Silverlight Security - A Hacker's Perspective''' &lt;br /&gt;
&lt;br /&gt;
'''Abstract''' &lt;br /&gt;
&lt;br /&gt;
It’s not news for anyone how the internet has revolutionized all aspects of our lives. In the past few years there has been unprecedented growth in web applications and their user base. One of the core technologies driving this widespread phenomenon is Rich Internet Applications (RIAs) because it offers the same level of responsiveness &amp;amp;amp; interactivity on web that is available to desktop applications. Microsoft offered its vision of RIA through Silverlight - a framework that allows web applications running in a browser to behave more like desktop applications. &lt;br /&gt;
&lt;br /&gt;
One of the major enhancements in Silverlight was the incorporation of mini-CLR engine, that on one hand, adds amazing capabilities for web developers but, on the other hand, also broadens the surface area of attack by opening previously nonexistent entry points into web applications. In this presentation Angelo &amp;amp;amp; Kamran will demonstrate how modern hackers can use reverse engineering techniques to take advantage of weak security implementation. They will also show some effective ways of defending against these types of attacks. &lt;br /&gt;
&lt;br /&gt;
'''Speakers:''' &lt;br /&gt;
&lt;br /&gt;
Angelo Chan is an experienced versatile software developer who has developed applications, middleware and low-level software for various platforms. With an initial background in Telecom, Angelo has since worked with different technologies and has discovered a passion for .NET. His interests include virtual machines, operating systems, network/application reverse engineering and security. Angelo can be reached at Angelo@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
Kamran Bilgrami is a seasoned software developer with proven track record of transforming complex business problems into viable technical solution. He has been instrumental in orchestrating highly available, performance centric, fault-tolerant real-time systems in a wide variety of industries including Telecom, Security and Human/Health Services. His areas of expertise include .NET, CLR Internals, Patterns and Security. Kamran can be reached at Kamran@WindowsDebugging.com &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== May, Thursday 12th 2011  ====&lt;br /&gt;
&lt;br /&gt;
'''Location:''' Bell - 160 Elgin St, Ottawa &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 1 - Chris Pierre: Beyond Facebook: How Hackers Might Obtain Information Individual for Social Engineering attacks''' &amp;lt;br&amp;gt; As the old saying goes “Know your enemy as you know yourself.” This discussion will examine several sources of publicly available information which an attacker might use to gain background information on a target for the purposes of a social engineering attack. The talk is expected to be interactive, lively and will provoke a discussion on how these systems and processes can be hardened against this type of attack. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' &lt;br /&gt;
&lt;br /&gt;
Chris Pierre BA, CFE, CISSP is an Ottawa-based forensic investigation professional. Having worked with several forensic firms prior to starting Evince Services, Inc., he has experience in many types of engagements in both the private &amp;amp;amp; public sectors &amp;amp;amp; specializes in investigations involving the internet. Forensic engagements have included information leaks, general corporate fraud investigations, investor fraud, intellectual property cases, administrative/internal investigations, background investigations, grants &amp;amp;amp; contributions fraud, corruption investigations &amp;amp;amp; the provision of training on the use of the Internet as an investigative tool. Preventative engagements have included training, background due diligence &amp;amp;amp; compliance consulting. &lt;br /&gt;
&lt;br /&gt;
Chris is an instructor at Algonquin College, the Canadian Police College, Past-President of the Ottawa Chapter of the High Tech Crime Investigators Association (HTCIA) &amp;amp;amp; a member of the Ottawa Chapter of the Association of Certified Fraud Examiners. &amp;lt;br&amp;gt; &amp;lt;br&amp;gt; '''Session 2: - David Mirza Ahmed: Introducing Vega, a New Open Source Web Vulnerability Scanner''' &lt;br /&gt;
&lt;br /&gt;
David will be presenting Vega, a new free and open source vulnerability scanner for web applications developed by Subgraph, his Montreal-based security startup. Vega allows anyone to scan their web applications for vulnerabilities such as cross-site scripting or SQL injection. Written in Java, Vega is cross-platform. It's also extensible, with a built-in Javascript interpreter and API for custom module development. Vega also includes an intercepting proxy for manual inspection of possible vulnerabilities and penetration testing. &lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt; '''About The Speaker''' David has over 10 years in the information security business. He started his professional experience as a founding member of Security Focus, which was acquired by Symantec in 2002. David also moderated the Bugtraq mailing list, a historically important forum for discussion of security vulnerabilities, for over four years. He has spoken at Black Hat, Can Sec West, AusCERT and numerous other security conferences, as well as made contributions to books, magazines and other publications. David also participated in a NIAC working group on behalf of Symantec to develop the first version of the CVSS (Common Vulnerability Scoring System) model and was an editor for IEEE Security &amp;amp;amp; Privacy. His current obsession is building Subgraph, his information security startup in Montréal. &amp;lt;br&amp;gt; &lt;br /&gt;
&lt;br /&gt;
==== March, Thursday 10th 2011  ====&lt;br /&gt;
&lt;br /&gt;
Speaker: Shan Gu - Accenture - Large enterprises are increasing their adoption of SOA at a rapid rate as interoperability standards and vendor product implementations mature and stabilize. However, moving enterprises into a loosely coupled IT paradigm introduces challenges around security and compliance. How do we address accountability, confidentiality, integrity, and trust in a large loosely couple ecosystem where consumers and providers don’t always maintain a permanent or stateful relationship? There are standards of course that help integrators and Architects design systems to communicate with each other in a secure manner, however these standards, when interpreted in their purest sense are complex and expensive to implement/maintain in large organizations. And systems that are operationally complex in terms of security are ironically the least secure. &lt;br /&gt;
&lt;br /&gt;
About The Speaker Shan Gu - Manager in the Security Technologies Practice at Accenture Shan is a Security Architect from Accenture who specializes in Identity and Access Management and SOA Security. He has worked with clients in both the Public and Private sectors and in various industries spanning from Health, to Transport, to Financial Services. Shan has spent his recent years focused on helping clients adopt SOA within the enterprise and to do it in a secure and cost effective manner. Shan is a graduate from Carleton University’s Systems and Computer Engineering program, with a B.Eng and a Minor in Business. &lt;br /&gt;
&lt;br /&gt;
==== More Previous Meetings  ====&lt;br /&gt;
&lt;br /&gt;
*September 10th, 2009 - Justin Foster - '''Speaker Notes:''' [http://www.developingsecurity.com/weblog/2009/09/crossing-the-border-javascript-exploits.html Download Here] &lt;br /&gt;
*April 6th, 2009 - Rafal Los - '''Speaker Notes:''' [http://www.owasp.org/images/3/3a/A_Laugh_RIAt2.zip Download Here] &lt;br /&gt;
*July 16th, 2008 - John Linehan - '''Speaker Notes:''' [https://www.owasp.org/index.php/Image:John_Linehan_OWASP_Dist.pdf Download Here] &lt;br /&gt;
*[[November 28th, 2007 - Eric Klien - Make my day]]&lt;br /&gt;
&lt;br /&gt;
= Chapter Leadership  =&lt;br /&gt;
&lt;br /&gt;
Chapter President: [mailto:sherif.koussa@owasp.org Sherif Koussa]&amp;amp;nbsp;&lt;br /&gt;
Chapter Committee: [mailto:sergei.frankoff@owasp.org Sergei Frankoff] and [mailto:mike.sues@owasp.org Mike Sues]&amp;amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
__NOTOC__ &amp;lt;headertabs /&amp;gt; &lt;br /&gt;
&lt;br /&gt;
[[Category:Canada]]&lt;/div&gt;</summary>
		<author><name>Koussa</name></author>	</entry>

	</feed>